A Powerful Subdomain Takeover Tool SubOver is a powerful tool for finding and exploiting subdomain takeover vulnerabilities. Features: * Fast and efficient scanning * Supports multiple protocols (HTTP, HTTPS, FTP, etc.) * Customizable scanning options Get started with SubOver today and take your subdomain takeover game to the next level!
FEATURES
SIMILAR TOOLS
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A subset of the Modern Honey Network project set up to run in docker, including hpfeeds broker, cowrie honeypot, and dionaea honeypot.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.