puredns
reconftw
puredns | reconftw | |
---|---|---|
3 | 3 | |
1,563 | 5,242 | |
- | - | |
4.9 | 9.2 | |
11 months ago | 10 days ago | |
Go | Shell | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
puredns
- Tools for subdomain brute forcing
- Too many DNS requests ?
-
Project to Regularly and Automatically Update Docker Image (called RAUDI)
Of course, you mentioned that in the description of the project. I was going to send a PR for puredns. It builds on top of massdns, is easier to use, & incorporates wildcard filtering. Also, the maintainer has declined to dockerise the project.
reconftw
- Automated recognition frameworks?
-
I made a CLI that streamlines Ethical Hacking workflow
Checkout ReconFTW
-
Tools for subdomain brute forcing
reconFTW = https://github.com/six2dez/reconftw
What are some alternatives?
massdns - A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
LazyRecon - An automated approach to performing recon for bug bounty hunting and penetration testing.
dnsvalidator - Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.
Sn1per - Attack Surface Management Platform
dnsx - dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
Resources-for-Beginner-Bug-Bounty-Hunters - A list of resources for those interested in getting started in bug bounties
RAUDI - A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed - This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
linx - Reveals invisible links within JavaScript files
Goohak - Automatically Launch Google Hacking Queries Against A Target Domain
docker-py - A Python library for the Docker Engine API
ReconPi - ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.