Croll1312 / C0M91373-H4CK1N6-C0U453-4ND-04-6U1D3
☆22Updated 2 years ago
Related projects: ⓘ
- ☆23Updated last year
- Collection of some pentesting and bugbounty resources☆41Updated 2 years ago
- ☆44Updated 2 years ago
- It's collection of my learning during 100 days .☆34Updated 2 years ago
- ☆14Updated 2 years ago
- Cool resources and content for bug bounty hunting.☆20Updated 2 years ago
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆46Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆34Updated 2 years ago
- I collected it to help the bug hunter get a reward☆55Updated 2 years ago
- Power of .bashrc and .bash_aliases☆32Updated last year
- Fast Bug Bounty Script☆36Updated last year
- ☆25Updated 4 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆16Updated 7 months ago
- A simple bash script to gather js files from waybackurls and check for any exposures using nuclei engine.☆0Updated 6 months ago
- ☆96Updated 2 years ago
- Hi everyone,☆57Updated last year
- ☆30Updated 8 months ago
- This repository is about Learn | Hack | Share | Repeat.☆11Updated last year
- Complite Web Application Penetration Testing☆26Updated 3 years ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆24Updated 3 years ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated last year
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 2 years ago
- Repositories, Links, Payloads, Blogs, Tools, etc.. which I think might be useful for pentesting and bug bounty☆24Updated last year
- Here are some cool and some unpublished Dorks☆22Updated 4 months ago
- Tips For Bug Bounty Hunters☆82Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆21Updated 9 months ago
- ☆21Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Updated 3 years ago
- Check List☆71Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆21Updated 2 years ago