An advanced toolkit for security researchers and bug bounty hunters, featuring automated command generation, comprehensive methodologies, and essential security tools.
Discovers subdomains using subfinder with recursive enumeration and saves results to a file.
Filters discovered subdomains using httpx and saves the alive ones to a file.
Checks for subdomain takeover vulnerabilities using subzy.
Collects URLs from various sources and saves them to a file.
Collects URLs from various sources using multiple techniques.
Collects URLs using GAU and saves them to a file.
Detects sensitive files on the web server.
Searches for information disclosure vulnerabilities using a dork.
Detects Git repositories on the web server.
Searches for Information disclosure vulnerabilities.
Finds S3 Buckets.
Finds API Keys in javascript files.
Collects XSS vulnerabilities using various tools and saves them to a file.
Uses Dalfox to scan for XSS vulnerabilities.
Finds potential stored XSS vulnerabilities by scanning forms.
Detects potential DOM-based XSS vulnerabilities.
Tests for Local File Inclusion (LFI) vulnerabilities using various methods.
Checks the Cross-Origin Resource Sharing (CORS) policy of a website.
Fast CORS misconfiguration scanner that helps identify potential CORS vulnerabilities.
Uses Nuclei to scan for CORS misconfigurations across multiple domains.
Tests for origin reflection vulnerability in CORS configuration.
Scans for open ports and services using Naabu.
Performs a full port scan using Nmap.
Scans for open ports and services using Masscan.
Scans a WordPress website for vulnerabilities and saves the results to a file.
Discovers parameters passively using Arjun.
Discovers parameters using a wordlist with Arjun.
Collects JavaScript files from a website and analyzes them.
Analyzes collected JavaScript files.
Checks the content type of URLs.
Checks for JavaScript content in URLs.
Searches for SSL certificates using Shodan.
Uses FFUF to bruteforce LFI vulnerabilities using a request file.
Uses FFUF to bruteforce XSS vulnerabilities using a request file.
Tests for XSS and SSRF vulnerabilities using various methods.