0xElkot / My-Nuclei-TemplatesLinks
☆34Updated 2 years ago
Alternatives and similar repositories for My-Nuclei-Templates
Users that are interested in My-Nuclei-Templates are comparing it to the libraries listed below
Sorting:
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37Updated 2 years ago
- ☆16Updated 6 months ago
- Authorization-Nuclei-Templates☆40Updated 9 months ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Updated 3 years ago
- Automated blind-xss search for Burp Suite☆23Updated 3 years ago
- Some of the gf patterns which i use☆44Updated 3 years ago
- ☆7Updated 2 years ago
- Some wordlists collected form github to all bug bounty hunters.☆32Updated 3 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- IIS shortname scanner + bruteforce☆52Updated last year
- A fast tool to scan SAAS,PAAS App written in Go☆84Updated 2 years ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Updated last year
- About Recon Tools,Methodology and writeups☆18Updated last year
- Simple Automation script for juniper cve-2023-36845☆17Updated last year
- ☆95Updated 3 years ago
- Nuclei Templates☆23Updated 8 months ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆36Updated 3 years ago
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆53Updated 2 years ago
- basic bbtools , buggy , not recommended to use☆35Updated 5 months ago
- Burp-suite Extension For finding .map files☆50Updated last year
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆28Updated last year
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Updated 3 years ago
- Results from analyzing data gathered from 1.6 billion subdomains☆27Updated 9 months ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year
- Tool for testing reflections in the HTTP responses☆60Updated 2 years ago
- ☆48Updated 3 weeks ago
- ☆81Updated 2 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Updated last year
- ☆17Updated last year
- ☆46Updated 2 years ago