BountySecurity / gbounty-profilesLinks
GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applications. These profiles outline a series of steps and conditions that the scanner follows during analysis, including specific requests, insertion points, and search patterns to detect vulnerabilities
☆24Updated 7 months ago
Alternatives and similar repositories for gbounty-profiles
Users that are interested in gbounty-profiles are comparing it to the libraries listed below
Sorting:
- ☆17Updated 3 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated 11 months ago
- Template Nuclei SSTI☆33Updated 2 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆35Updated 11 months ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Updated last year
- ☆14Updated last week
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Updated last year
- ☆31Updated 6 months ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Updated last year
- Enhanced 403 bypass header☆21Updated 3 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 2 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆81Updated last year
- BurpSuite extension to convert requests into bcheck scripts☆33Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- ☆19Updated 2 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Updated 4 years ago
- ☆45Updated 2 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Web cache poisoning vulnerability scanner.☆71Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Fuzz every path with goky☆15Updated last year
- Supertruder but better☆31Updated 2 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆38Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Get list of subsidiaries for a selected company☆29Updated 10 months ago
- Url scrapper or extractor from alienvault☆39Updated 7 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Updated last year