0xKayala / A-to-Z-VulnerabilitiesLinks
This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order
☆68Updated 8 months ago
Alternatives and similar repositories for A-to-Z-Vulnerabilities
Users that are interested in A-to-Z-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆179Updated this week
- Python for AWAE (Advanced Web Attacks and Exploitation)☆100Updated 2 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Updated last year
- A passive way to find backups/ sensitive information.☆90Updated 4 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆65Updated last year
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Updated 4 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆208Updated 2 months ago
- Private Nuclei Templates☆100Updated 9 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 11 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆61Updated 7 months ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Updated 11 months ago
- Host Header Vulnerability Scanner Automated Tool☆27Updated 7 months ago
- ☆156Updated 8 months ago
- Automate Recon XSS Bug Bounty☆176Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆118Updated last year
- ☆124Updated 3 months ago
- A tool for inspecting and analyzing mobile application storage files.☆48Updated 6 months ago
- This script can be used to find html forms in the list of endpoints/urls.☆49Updated last year
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆58Updated 10 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Updated 9 months ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Updated last year
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆36Updated last year
- ☆108Updated 2 years ago
- ☆75Updated 5 months ago
- ☆80Updated last year
- Here Are Some Bug Bounty Resource From Twitter☆103Updated 5 months ago
- ☆183Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆31Updated last month
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆39Updated 3 weeks ago