censys-subdomain-finder Logo

censys-subdomain-finder

0
Free
Visit Website

Perform subdomain enumeration using the certificate transparency logs from Censys. This tool allows you to scan for subdomains of a given domain and retrieve information about the SSL/TLS certificates used by those subdomains. It uses the Censys API to fetch the certificate transparency logs and then parses the logs to extract the subdomains and their corresponding SSL/TLS certificates.

FEATURES

ALTERNATIVES

A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.

Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.

A multi-tool for subdomain enumeration

An analyzer for parsing GQUIC traffic in Zeek, supporting versions Q039 to Q046, with a fingerprinting method named 'CYU' for detecting anomalous GQUIC traffic.

Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.

Detects the presence of a Responder in the network by sending crafted LLMNR queries.

CapTipper is a python tool to analyze, explore, and revive HTTP malicious traffic.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security