0xKayala / A-to-Z-VulnerabilitiesLinks
This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order
☆58Updated 7 months ago
Alternatives and similar repositories for A-to-Z-Vulnerabilities
Users that are interested in A-to-Z-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Updated last year
- A passive way to find backups/ sensitive information.☆89Updated 3 months ago
- ☆146Updated 7 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆100Updated 2 years ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆162Updated this week
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆62Updated 5 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 3 months ago
- ☆78Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆181Updated 3 weeks ago
- Private Nuclei Templates☆100Updated 7 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆134Updated last year
- A tool for inspecting and analyzing mobile application storage files.☆47Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated last year
- Automate Recon XSS Bug Bounty☆174Updated 4 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 10 months ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆85Updated 3 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆65Updated last year
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆84Updated 3 months ago
- ☆124Updated last month
- Grep subdomains from web pages.☆45Updated 8 months ago
- ☆73Updated 4 months ago
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆54Updated 9 months ago
- ☆97Updated 6 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆62Updated 7 months ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆94Updated 2 months ago
- ☆25Updated last year
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆37Updated last month
- ☆123Updated 2 months ago
- ☆183Updated 11 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆35Updated last year