- 34 M Wordlist Subdomain Brute Force
- Asn Based Network Scan
- Asset Discovery and Vulnerability Scanning
- Custom Subdomain Brute Force Wordlist From Ip Ranges
- Enumerate Cloud Resources
- Full Subdomain Enumeration
- Get Ips and Cnames
- Github Recon and Scanner
- Hostnames S3 Bucket Finder
- Simple Content Discovery
- Creating a Workflow
- Downloading a Result
- Executing a Workflow
- How Do Machines Work
- Keeping Track of a Run
- Navigating in Workflow Editor
- Saving a Workflow and History
- Scheduling a Workflow
- Using Workflows From Library
- Concepts and Architecture
- Spaces and Projects
- Trickest CLI
Library is a searchable repository of all ready-to-go nodes available to be used in workflows (Tools and Scripts), as well as ready-to-go workflows (Templates) available to be used in Trickest platform.
Tools are ready-to-go nodes made by the global hacking community and used every day in offensive security.
Support original authors and contributorsEvery tool on the platform has information about the GitHub author and the original GitHub repository link. Support, contribute, star, or donate to help the community become better.
Scripts are customizable ready-to-go nodes made by Trickest. All scripts are implemented as a Bash, with a pre-installed Ubuntu 20.04.4 LTS.
Write your ownBeside pre-built scripts, able to be modified with ease, use a custom-script node to write your own script from scratch.
Templates are pre-built workflows that you can use off the shelf and get some automation inspiration.
There are more than 50 templates covering the most common use cases.
Using a TemplateLearn [to use a Template](../tutorials/using-workflows-from-library.md) to cover and automate real use cases in a minute without additional effort.
Get a Video Demo
Fill out and submit this form to receive an in-depth video demo of the Trickest platform.
Talk To Sales
Fill out the form and we'll get back to you about any questions you have on our products, services, pricing, or scheduling a demo.