Find URLs and subdomains.
7 listed tools Last update on 2025-04-28
Recon: Information gathering stage, where attackers gather as much information as possible about the target.
Weaponization: Crafting of tools or payloads to exploit vulnerabilities.
Delivery: The transmission of the weaponized payload to the target.
Exploitation: Exploiting a vulnerability to gain access to the target system.
Installation: Establishing a foothold on the target system.
Command & Control (C2): Setting up channels for communication with the compromised system.
Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.
Open-source
Getallurls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl
Open-source
A subdomain discovery tool that discovers valid subdomains for websites by using passive online sources
Open-source
Analyze URLs and estimate entropies to find URLs that might be vulnerable to attack
Open-source
Accept line-delimited domains on stdin, fetch URLs from the Wayback Machine for *.domain and output them on stdout