0xKayala / A-to-Z-VulnerabilitiesLinks
This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order
☆70Updated 9 months ago
Alternatives and similar repositories for A-to-Z-Vulnerabilities
Users that are interested in A-to-Z-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Updated last year
- Python for AWAE (Advanced Web Attacks and Exploitation)☆100Updated 2 years ago
- Automate Recon XSS Bug Bounty☆175Updated 6 months ago
- A passive way to find backups/ sensitive information.☆90Updated 5 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆36Updated last year
- ☆159Updated 9 months ago
- Private Nuclei Templates☆100Updated 9 months ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Updated 5 months ago
- ☆109Updated 2 years ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆134Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆63Updated 7 months ago
- Here Are Some Bug Bounty Resource From Twitter☆103Updated 6 months ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Updated 11 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆211Updated 2 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆122Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆64Updated 9 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆65Updated last year
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆190Updated last week
- ☆124Updated 3 months ago
- Tools and methods that I personally use for Recon and Exploitations☆45Updated 7 months ago
- Ultimate Wordlist for Web Content Discovery☆67Updated 7 months ago
- Grep subdomains from web pages.☆45Updated 10 months ago
- ☆81Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆32Updated 2 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆119Updated last year
- ☆170Updated last year
- This script can be used to find html forms in the list of endpoints/urls.☆50Updated last year
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆31Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆90Updated 10 months ago
- ☆66Updated last year