Library
- Trickest Library
- Modules
- Attack Surface Management
- Cloud Storage
- Containers
- Content Discovery
- Discovery
- Fuzzing
- Machine Learning
- Misconfiguration
- Network
- OSINT
- Passwords
- Recon
- Scanners
- Secret Discovery
- Social Engineering
- Static Code Analysis
- Threat Intelligence
- Utilities
- Vulnerabilities
- Vulnerability Scanning
Workflows
Explore a collection of powerful and efficient workflows in the Utilities category to enhance your productivity and security.
Enumerate TLD domain names
Find registered domains for a specific TLD
Safe Harbour
Security.txt collection of the most popular world-wide domains
Diff subdomain enumeration results
This workflow demonstrates how to compare the output of the current run with previous runs. Use this pattern as a guide and customize it for your own workflow. For more information, refer to the documentation.
Github Recon & Scanner
Create your own recon & vulnerability scanner with Trickest and GitHub - https://github.com/trickest/recon-and-vulnerability-scanner-template
GetDNS
Get DNS servers using Masscan and dnsvalidator.
Alexa's Top 1000 robots.txt
Get all the robots.txt files and directories from Alexa's Top 1000 websites.
CVEs
Almost every publicly available CVE PoC - https://github.com/trickest/cve
Resolvers
The most exhaustive list of reliable DNS resolvers - https://github.com/trickest/resolvers
Historical workflow data
Example workflow to show how to access the historical data of a Trickest workflow
Port-scan and send results to slack
Use masscan to do a portscan on a list of IP addresses and receive the results via a slack webhook