Avileox / BB-SH-BView external linksLinks
☆34Feb 15, 2021Updated 4 years ago
Alternatives and similar repositories for BB-SH-B
Users that are interested in BB-SH-B are comparing it to the libraries listed below
Sorting:
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- ☆17May 20, 2021Updated 4 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- A small pentesting lab for Azure☆11Apr 19, 2019Updated 6 years ago
- ☆11May 28, 2020Updated 5 years ago
- ☆13Feb 18, 2022Updated 3 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 9 months ago
- Keep track of changes in website with WEBSY☆35May 22, 2023Updated 2 years ago
- List HackerOne private program assets☆154Jun 24, 2021Updated 4 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 2 months ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- ☆11May 15, 2020Updated 5 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 3 months ago
- random notes☆47Jul 9, 2025Updated 7 months ago
- Horizontal Domain Discovery☆77May 22, 2023Updated 2 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆26May 30, 2021Updated 4 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆98Sep 24, 2023Updated 2 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago