second-order Logo

second-order

0
Free
Updated 11 March 2025
Visit Website

Second-order subdomain takeover scanner Second-order subdomain takeover scanner is a tool that helps in identifying subdomain takeover vulnerabilities. Features: * Scans for subdomain takeover vulnerabilities * Identifies potential vulnerabilities * Provides detailed reports How it works: 1. Scan for subdomain takeover vulnerabilities 2. Identify potential vulnerabilities 3. Provide detailed reports Why it's useful: * Helps in identifying potential security vulnerabilities * Helps in securing subdomains * Helps in improving overall security posture Get started: 1. Clone the repository 2. Run the script 3. Review the reports License: MIT License

FEATURES

SIMILAR TOOLS

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

Digital investigation tool for extracting forensic data from computers and managing investigations.

A tool for fixing acquired .evt Windows Event Log files in digital forensics.

A command-line utility to show and change EXIF information in JPEG files

Tool for parsing Android logs events and protobuf data

Web interface for the Volatility Memory Analysis framework with advanced features.

Open source digital forensics tools for analyzing disk images and recovering files.

A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.

An anti-forensic Linux Kernel Module kill-switch for USB ports.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved