• Stars
    star
    2
  • Language
    Go
  • License
    MIT License
  • Created over 3 years ago
  • Updated almost 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Sikert is an subdomain enumeration tool which uses different sources to perform enumeration.

More Repositories

1

Attacksurfacemanagement

Attack surface management is an attacker perspective about how the attacker may see the organizational assets to be vulnerable and to be exploited by the attacker.
Python
4
star
2

pawned_and_owned

Pawned and owned framework is a web application based on sharing data dump from different sources such as pastebin, sharing sites and dark web dump so that the organization can be alerted of compromised information found in those breaches.
HTML
3
star
3

AttackSurfaceManagement

Attack surface management is an attacker perspective about how the attacker may see the organizational assets to be vulnerable and to be exploited by the attacker.
Python
3
star
4

axtrack

Axtrack extract all possible urls for a given domain from archive.
Go
2
star
5

pawny

Pawny is a data breach cli tool used to detect breaches related to email address and domain name.
Python
2
star
6

AttackSurfaceManagement-DOCS

Attack surface management is an attacker perspective about how the attacker may see the organizational assets to be vulnerable and to be exploited by the attacker.
Python
1
star
7

hunter

Hunter is wrapper for hunter.io based on community version written in python, aimed to help security researcher build their integrations with hunter.io.
Python
1
star
8

sectrails

Sectrails is wrapper for security trails based on community version written in python, aimed to help security researcher build their integrations with security trails.
Python
1
star
9

eframe

Eframe : Eframe is a web application built for the purpose of providing the organization better understanding of their assets such as email address and their presence on various platform and what possible attack vector can be developed against the victims.
HTML
1
star