second-order Logo

second-order

0
Free
Visit Website

Second-order subdomain takeover scanner Second-order subdomain takeover scanner is a tool that helps in identifying subdomain takeover vulnerabilities. Features: * Scans for subdomain takeover vulnerabilities * Identifies potential vulnerabilities * Provides detailed reports How it works: 1. Scan for subdomain takeover vulnerabilities 2. Identify potential vulnerabilities 3. Provide detailed reports Why it's useful: * Helps in identifying potential security vulnerabilities * Helps in securing subdomains * Helps in improving overall security posture Get started: 1. Clone the repository 2. Run the script 3. Review the reports License: MIT License

FEATURES

ALTERNATIVES

A command-line utility for extracting human-readable text from binary files.

Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.

View physical memory as files in a virtual file system for easy memory analysis and artifact access.

A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.

A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.

An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.

A next-generation crawling and spidering framework for extracting data from websites

Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.

PINNED