A list of interesting payloads, tips and tricks for bug bounty hunters.
☆19Sep 4, 2018Updated 7 years ago
Alternatives and similar repositories for bugbounty-cheatsheet
Users that are interested in bugbounty-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Key Logger with UI☆40Jun 11, 2016Updated 9 years ago
- DES Encrypter/Decrypter☆21Feb 12, 2017Updated 9 years ago
- Command Line Interface of ViPER Pen Testing tool.☆14Nov 26, 2016Updated 9 years ago
- Dynamic analysis with frida tutorial☆11Dec 24, 2018Updated 7 years ago
- ☆10Nov 14, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆21Nov 5, 2011Updated 14 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- Accepts email and password as command-line argument, returns token.☆10Nov 22, 2018Updated 7 years ago
- Qubes OS infrastructure configuration☆24Updated this week
- Creates custom images via ImageBuilder for PirateBox needs☆13Oct 18, 2019Updated 6 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Jul 8, 2019Updated 6 years ago
- WebScan is a web vulnerability Scanning tool, which scans sites for SQL injection and XSS vulnerabilities☆30Sep 7, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Detects and extracts images from Goerli Testnet blockchain☆23Nov 25, 2021Updated 4 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- my old dotfiles managed by gnu stow☆11Dec 9, 2024Updated last year
- Records and correlates nick!user@host information☆46Sep 14, 2013Updated 12 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 6 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- ProtocolLib is required! A proof of concept for an exploit in recent all Minecraft versions that allows servers to give users capes.☆14Jan 29, 2019Updated 7 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Builds a hosts file and an Unbound config for blocking advertising and malware domains.☆10Jan 3, 2016Updated 10 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CrabCrypt is a secure file encryption tool with GUI, designed for effortlessly encrypting and decrypting any file. With AES encryption an…☆25Mar 17, 2025Updated last year
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- David Dart's Piratebox scripts reformed for laptop usage.☆26Apr 9, 2020Updated 6 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Mar 27, 2026Updated 2 weeks ago