Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting. It helps in identifying potential vulnerabilities and weaknesses in a domain's infrastructure. Sudomy is a powerful tool for security researchers, bug hunters, and penetration testers to identify potential entry points for exploitation.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.
A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.
Back-end component for red team operations with crucial design considerations.
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.
Interactive online malware sandbox for real-time analysis and threat intelligence
A framework for exploiting Android-based devices and applications
Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.