0xKayala / A-to-Z-VulnerabilitiesLinks
This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order
☆43Updated 4 months ago
Alternatives and similar repositories for A-to-Z-Vulnerabilities
Users that are interested in A-to-Z-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆82Updated this week
- Python for AWAE (Advanced Web Attacks and Exploitation)☆96Updated last year
- ☆65Updated 2 years ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆55Updated 2 months ago
- A passive way to find backups/ sensitive information.☆85Updated last week
- Web Application Penetration Testing☆121Updated 2 months ago
- Private Nuclei Templates☆100Updated 4 months ago
- HackLiners: CyberSec/BugHunting OneLiners☆59Updated 9 months ago
- ☆66Updated 11 months ago
- Here Are Some Bug Bounty Resource From Twitter☆99Updated last month
- ☆166Updated 8 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆122Updated 7 months ago
- ☆66Updated last month
- ☆118Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆113Updated 9 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 9 months ago
- ☆136Updated 4 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆95Updated 2 weeks ago
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆49Updated 6 months ago
- ☆68Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆63Updated 11 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆32Updated 11 months ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆154Updated last year
- Nuclei-AI-Prompts☆216Updated 3 weeks ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆215Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆60Updated 4 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆158Updated 2 months ago
- My Notes & Resources Of Bug Bounty Checklists☆71Updated 6 months ago
- ☆106Updated 2 years ago