CyberSecurityUP / HunterX
King of Bug Bounty Tips Simple Tool
☆12Updated 3 years ago
Alternatives and similar repositories for HunterX:
Users that are interested in HunterX are comparing it to the libraries listed below
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Automate bug bounty recon using bash alias☆14Updated 8 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 8 months ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- ☆10Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ☆38Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 3 years ago
- ☆15Updated last year
- ☆12Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆14Updated 2 years ago
- C2Matrix Automation☆12Updated last year
- Find CVEs that don't have a Detectify modules.☆21Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- ☆15Updated last year
- List of bug bounty programs of companies/organisations in Switzerland☆13Updated 3 years ago
- A solid recon tool I use personally.☆30Updated last year
- ☆19Updated 3 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Updated 3 years ago
- List of custom Nuclei templates☆15Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- ☆17Updated last year
- ☆21Updated 4 years ago
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 10 months ago
- ☆15Updated 2 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated 2 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year