Second-order subdomain takeover scanner Second-order subdomain takeover scanner is a tool that helps in identifying subdomain takeover vulnerabilities. Features: * Scans for subdomain takeover vulnerabilities * Identifies potential vulnerabilities * Provides detailed reports How it works: 1. Scan for subdomain takeover vulnerabilities 2. Identify potential vulnerabilities 3. Provide detailed reports Why it's useful: * Helps in identifying potential security vulnerabilities * Helps in securing subdomains * Helps in improving overall security posture Get started: 1. Clone the repository 2. Run the script 3. Review the reports License: MIT License
FEATURES
ALTERNATIVES
A command-line utility for extracting human-readable text from binary files.
Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.
View physical memory as files in a virtual file system for easy memory analysis and artifact access.
A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
A next-generation crawling and spidering framework for extracting data from websites
Windows anti-forensics USB monitoring tool with the ability to shutdown the computer upon detecting the unplugging of a specified USB device.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.