Payload for bug bounty
☆98Jul 7, 2024Updated last year
Alternatives and similar repositories for Payloads
Users that are interested in Payloads are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated 11 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- ☆139Nov 9, 2024Updated last year
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- ☆28Nov 3, 2024Updated last year
- ☆124Aug 24, 2025Updated 6 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆199May 22, 2025Updated 9 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Nov 22, 2024Updated last year
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 2 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Resources for Mobile Application Testing 📓☆75Mar 30, 2024Updated last year
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.☆190Mar 18, 2025Updated 11 months ago
- ☆184Oct 22, 2024Updated last year
- ☆47May 31, 2024Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆163Feb 22, 2026Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Jul 31, 2024Updated last year
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- Fuzz 401/403/404 pages for bypasses☆388Jan 22, 2026Updated last month
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- ☆231Jan 20, 2026Updated last month
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago
- ☆18Apr 13, 2023Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago