Abhishek22K / Hostel-Management-SystemLinks
☆10Updated last year
Alternatives and similar repositories for Hostel-Management-System
Users that are interested in Hostel-Management-System are comparing it to the libraries listed below
Sorting:
- https://ioc.ghtk.vn/☆10Updated 2 years ago
- You can download.. modify and Grow it☆11Updated 7 months ago
- ☆17Updated 2 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,001Updated this week
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,592Updated this week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,721Updated last week
- Top disclosed reports from HackerOne☆4,898Updated 3 weeks ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,069Updated last year
- ☆8,186Updated last year
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,114Updated last year
- A curated list of various bug bounty tools☆5,370Updated 3 weeks ago
- Ressources for bug bounty hunting☆1,865Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,805Updated last month
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆4,742Updated 8 months ago
- Rockyou for web fuzzing☆2,917Updated last month
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,482Updated this week
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆2,887Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,377Updated 8 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,591Updated 9 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,155Updated last week
- Find domains and subdomains related to a given domain☆3,420Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,796Updated last year
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,588Updated this week
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,137Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,349Updated 2 years ago
- ☆11Updated 9 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,461Updated 2 years ago
- A collection of one-liners for bug bounty hunting.☆1,366Updated 8 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆34Updated last year
- HTTP parameter discovery suite.☆5,882Updated 7 months ago