Sublist3r VS ssimap

Compare Sublist3r vs ssimap and see what are their differences.

Sublist3r

Fast subdomains enumeration tool for penetration testers (by aboul3la)

ssimap

Attempts to test target url for server side include vulnerabilities. (by cyberrumor)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
Sublist3r ssimap
12 2
9,243 0
- -
0.0 4.5
3 months ago over 3 years ago
Python Python
GNU General Public License v3.0 only -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Sublist3r

Posts with mentions or reviews of Sublist3r. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-15.

ssimap

Posts with mentions or reviews of ssimap. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-03-06.
  • How to find out all the "routes" of a website?
    2 projects | /r/HowToHack | 6 Mar 2021
    Happy to help. I believe wireshark can automatically decrypt SSL if it listens to the key exchange upon first connection. Just to clarify, if your requests are being made by localhost to a bound port, people on your network can't sniff that kind of thing with wireshark, since the request/response never leaves the local computer. Other avenues of discovery might try looking in /robots.txt or recursively searching all hrefs (if you have an href somewhere on your site that links to the pages that should be hidden). An example of which you can find in my ssimap project.
  • What happens to all the 'Noobs'
    1 project | /r/HowToHack | 6 Mar 2021
    I posted once about SSI injection. I went on to learn python and made a script that automates it, although it doesn't use escape characters at all, so it will only be able to exploit the vulnerability if it's 100% vulnerable with no efforts to mitigate the vulnerability at all. I've been working on a monero mining pool and have been loving python, also wrote this downloader to get anime from wcostream quickly. That was a fun project because the file location is obfuscated by javascript, so I had to learn a little javascript along the way. As for hacking, I still haven't succeeded in any bug bounties but I understand networking and HTTP requests on a much more intricate level than a did a few years ago. I'll get there someday, it's a long journey.

What are some alternatives?

When comparing Sublist3r and ssimap you can also consider the following projects:

subbrute - A DNS meta-query spider that enumerates DNS records, and subdomains.

Sudomy - Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.

wpscan - WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]

RustScan - 🤖 The Modern Port Scanner 🤖

BloodHound - Six Degrees of Domain Admin

WhatWeb - Next generation web scanner

PyRCON - Menu based python recon tool

netdiscover - Netdiscover, ARP Scanner (official repository)

Uniscan - Uniscan web vulnerability scanner

subscraper - Subdomain and target enumeration tool built for offensive security testing