List of bug bounty programs of companies/organisations in Switzerland
☆13Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for swiss-bugbounty-programs
Users that are interested in swiss-bugbounty-programs are comparing it to the libraries listed below
Sorting:
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- ☆23Oct 28, 2022Updated 3 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- ☆42Oct 28, 2021Updated 4 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A way to force your wifi-pineapple to use SSL☆14Jul 26, 2017Updated 8 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- Xssor.go is a xss reflections checker for urls☆72Mar 22, 2023Updated 2 years ago
- ☆20Mar 26, 2025Updated 11 months ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Dec 22, 2016Updated 9 years ago
- ☆30Sep 13, 2021Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- sqlmap cheat sheet☆15Apr 6, 2023Updated 2 years ago
- Brute force otp on has no rate limit☆13Aug 1, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆225Aug 29, 2024Updated last year
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆55Dec 21, 2020Updated 5 years ago
- Random Tools☆19Jan 23, 2019Updated 7 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Mar 25, 2024Updated last year
- security.txt collection of most popular world-wide domains☆56Sep 25, 2023Updated 2 years ago
- ☆43Mar 2, 2026Updated 2 weeks ago
- All kinds of programs are accepted here, raise a genuine PR, and claim a PR, Make 4 successful PR's and get the Stickers and T-Shirt from…☆34Oct 31, 2021Updated 4 years ago
- 🐬 A collection of awesome resources for the Flipper Zero device.☆24Oct 30, 2023Updated 2 years ago
- Returns disallowed paths from robots.txt found on your target domain and snapshotted by the Wayback Machine☆28Jul 18, 2025Updated 8 months ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32May 15, 2022Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆25May 17, 2015Updated 10 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago