Pinned Repositories
003Recon
Some tools to automate recon - 003random
alpha-stage-scripts
Repo contains a list of random scripts that I use while testing out random things.
amass
In-Depth Subdomain Enumeration
android-backup-extractor
Android backup extractor
Android-Reports-and-Resources
A big list of Android Hackerone disclosed reports and other resources.
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
angularjs-csti-scanner
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Anubis
Subdomain enumeration and information gathering tool
DomainWatch
DomainWatch allows everyone to monitor domains for possible take-overs.
recon
information gathering
attacker34's Repositories
attacker34/recon
information gathering
attacker34/auto.sh
This script is (Mainly) for Beginner's
attacker34/Automated-Scanner
Trying to make automated recon for bug bounties
attacker34/Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
attacker34/crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
attacker34/CVE-2020-0618
SQL Server Reporting Services(CVE-2020-0618)中的RCE
attacker34/dnsprobe
DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.
attacker34/ExtAnalysis
Browser Extension Analysis Framework - Scan, Analyse Chrome and firefox extensions for vulnerabilities and intels
attacker34/ffufplus
You can read the writeup on this script here
attacker34/github-email
Get a GitHub user's email. All sneaky-like. :sunglasses:
attacker34/github-search
Tools to perform basic search on GitHub.
attacker34/h8mail
Password Breach Hunting & Email OSINT tool, locally or using premium services. Supports chasing down related email
attacker34/HostHunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
attacker34/IntelOwl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
attacker34/jwt_tool
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
attacker34/kamerka
Build interactive map of cameras from Shodan
attacker34/lectl
Script to check issued certificates by Let's Encrypt on CTL (Certificate Transparency Log) using https://crt.sh
attacker34/LiveTargetsFinder
Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts and gather service information
attacker34/myrecon.py
My recon script
attacker34/nuclei
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
attacker34/nuclei-templates
Community curated list of template files for the nuclei engine
attacker34/ohmybackup
Scan Victim Backup Directories & Backup Files
attacker34/open-redirect-payload-list
🎯 Open Redirect Payload List
attacker34/PoC-in-GitHub
📡PoC auto collect from GitHub.
attacker34/pown-recon
A powerful target reconnaissance framework powered by graph theory.
attacker34/pyintelowl
Simple Client for Intel Owl
attacker34/shuffledns
shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support.
attacker34/sifter
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.
attacker34/Silver
Mass scan IPs for vulnerable services
attacker34/sub.sh
Online Subdomain Detect Script