0xKayala / A-to-Z-VulnerabilitiesLinks
This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts in an Alphabetical Order
☆74Updated 9 months ago
Alternatives and similar repositories for A-to-Z-Vulnerabilities
Users that are interested in A-to-Z-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Updated last year
- Automate Recon XSS Bug Bounty☆176Updated this week
- Python for AWAE (Advanced Web Attacks and Exploitation)☆100Updated 2 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Updated 5 months ago
- A passive way to find backups/ sensitive information.☆88Updated 6 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- ☆109Updated 2 years ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆66Updated last year
- ☆78Updated 7 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆192Updated last week
- ☆210Updated 10 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated last year
- ☆84Updated last year
- Private Nuclei Templates☆100Updated 10 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆63Updated 8 months ago
- Here Are Some Bug Bounty Resource From Twitter☆106Updated 7 months ago
- ☆47Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆216Updated 3 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆119Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Updated 10 months ago
- Tools and methods that I personally use for Recon and Exploitations☆45Updated 8 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Updated last year
- ☆90Updated 4 months ago
- HackLiners: CyberSec/BugHunting OneLiners☆62Updated last year
- Hi everyone,☆61Updated 2 years ago
- ☆124Updated 4 months ago
- ☆184Updated last year
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Updated last year
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆108Updated 3 years ago
- My small collection of reports templates (This is a fork of orignal repo from https://github.com/gwen001/BB-datas)☆127Updated 2 years ago