
from aboutsecurity1,200
High-speed, stateless subdomain brute-force and verification using ksubdomain; optimized for large-scale discovery and validation where raw-socket performance a
ksubdomain-brute documents how to use ksubdomain — a stateless, raw-socket subdomain brute-forcing and verification tool — to discover and validate large numbers of subdomains at very high speed. The skill covers two primary modes (verify and enum), bandwidth control, resolver configuration, and practical command examples for integrating with tools like subfinder. It’s intended for large-scale reconnaissance and validation workflows where speed and throughput are essential.
Use this skill when you need to validate or enumerate large subdomain lists quickly (e.g., pentest target mapping, large-scope asset discovery, or automated verification of enumerated lists). Prefer ksubdomain when raw-socket performance or extreme throughput matters and when you can run with elevated privileges (root) and control bandwidth to avoid network disruption.
{}
This skill has not been reviewed by our automated audit pipeline yet.
Command Injection Methodology
Comprehensive methodology for detecting, exploiting, and bypassing OS command injection, including blind extraction and output-filtering workarounds.
Credential Spray Methodology
Methodology for credential spraying and reuse attacks: safe spray strategies, pass-the-hash, multi-service testing, and result analysis for lateral movement.
CTF Reverse Engineering
Practical reverse-engineering techniques for CTFs: static & dynamic analysis, anti-debug bypasses, custom VM handling, and multi-platform tooling.