Payload for bug bounty
☆98Jul 7, 2024Updated last year
Alternatives and similar repositories for Payloads
Users that are interested in Payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Mar 21, 2025Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- ☆139Nov 9, 2024Updated last year
- ☆29Nov 3, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆187Mar 14, 2026Updated 3 weeks ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- ☆15Jun 26, 2025Updated 9 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆46Feb 25, 2026Updated last month
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- AI-powered ffuf wrapper☆711Dec 4, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Acunetix Professional v24.1☆19Mar 2, 2024Updated 2 years ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- ☆124Aug 24, 2025Updated 7 months ago
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆175Feb 22, 2026Updated last month
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆32Feb 17, 2023Updated 3 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- ☆13Nov 7, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 11 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- My Private Bug Hunting Methodology☆317Nov 27, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆337Sep 11, 2025Updated 7 months ago
- Resources for Mobile Application Testing 📓☆77Mar 30, 2024Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆342Mar 26, 2025Updated last year
- ☆61Nov 30, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Active monitoring bug bounty programs tool☆49Jan 21, 2026Updated 2 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆206May 22, 2025Updated 10 months ago
- ☆19Apr 13, 2023Updated 2 years ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- 一个用于web框架、CDN和CMS指纹识别的高性能命令行工具。A high-performance command-line tool for web framework, CDN and CMS fingerprinting.☆295Jul 18, 2025Updated 8 months ago