GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applications. These profiles outline a series of steps and conditions that the scanner follows during analysis, including specific requests, insertion points, and search patterns to detect vulnerabilities
☆25Mar 11, 2025Updated last year
Alternatives and similar repositories for gbounty-profiles
Users that are interested in gbounty-profiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆161Aug 28, 2025Updated 6 months ago
- Nuclei plugin for BurpSuite☆15Nov 29, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Burpsuite Extension for Jsmon☆23Feb 5, 2026Updated last month
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- ☆16Jan 23, 2026Updated 2 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Apr 21, 2025Updated 11 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 8 months ago
- ☆15May 3, 2024Updated last year
- ☆10Aug 17, 2021Updated 4 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- ☆41Mar 12, 2025Updated last year
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated last year
- Nuclei templates to run on urls☆17Sep 14, 2023Updated 2 years ago
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- ☆38Dec 14, 2024Updated last year
- ☆10Jul 8, 2024Updated last year
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Extended keyboard layers for easy navigation and functionality based on Colemak☆12Jan 31, 2026Updated last month
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 8 months ago
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 2 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago