Payload for bug bounty
☆98Jul 7, 2024Updated last year
Alternatives and similar repositories for Payloads
Users that are interested in Payloads are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- ☆28Nov 3, 2024Updated last year
- ☆139Nov 9, 2024Updated last year
- ☆185Mar 14, 2026Updated last week
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- ☆14Jun 26, 2025Updated 8 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆47Feb 25, 2026Updated 3 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- AI-powered ffuf wrapper☆651Dec 4, 2025Updated 3 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Acunetix Professional v24.1☆19Mar 2, 2024Updated 2 years ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- ☆124Aug 24, 2025Updated 6 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆171Feb 22, 2026Updated last month
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- ☆13Nov 7, 2023Updated 2 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 10 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆335Sep 11, 2025Updated 6 months ago
- Resources for Mobile Application Testing 📓☆77Mar 30, 2024Updated last year
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆341Mar 26, 2025Updated 11 months ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- ☆61Nov 30, 2024Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆202May 22, 2025Updated 10 months ago
- Active monitoring bug bounty programs tool☆49Jan 21, 2026Updated 2 months ago
- ☆18Apr 13, 2023Updated 2 years ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year