418sec / huntrLinks
Public Roadmap | huntr.dev
☆269Updated last year
Alternatives and similar repositories for huntr
Users that are interested in huntr are comparing it to the libraries listed below
Sorting:
- You can read the writeup on this script here☆274Updated 5 years ago
- Vulnerability Scan with Nuclei☆272Updated last month
- Default signature for Jaeles Scanner☆325Updated 3 years ago
- Second-order subdomain takeover scanner☆405Updated 3 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆298Updated 2 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Updated 2 years ago
- DOM XSS scanner for Single Page Applications☆415Updated last month
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆447Updated last month
- Python tool to find potential Server Side Reqest Forgery (SSRF) vulnerability parameters.☆335Updated 4 months ago
- DNS rebinding toolkit☆255Updated 2 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆217Updated 5 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆320Updated 2 months ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆415Updated 5 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Updated 4 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆292Updated 6 years ago
- Web App bug hunting☆576Updated 2 weeks ago
- HackerOne Wallpapers☆76Updated 4 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆171Updated 5 years ago
- A DNS Bruteforcing Wordlist Generator☆361Updated 2 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆515Updated 3 years ago
- ☆557Updated 8 months ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆104Updated 6 years ago
- Secret and/or credential patterns used for gf.☆243Updated 2 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆281Updated last year
- Bugbounty scope tool☆331Updated 9 months ago
- automated web assets enumeration & scanning [DEPRECATED]☆289Updated 2 years ago
- ☆375Updated 4 years ago
- ☆172Updated 4 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆288Updated 4 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year