🧐
researching
Penetration Tester | eJPTv2 | Bug Bounty Hunter
Stars
5
stars
written in Go
Clear filter
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.
Scrape domain names from SSL certificates of arbitrary hosts