BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for performing attacks (google dorking, sqli, xss), reporting, and managing VPN/proxy settings, making it an indispensable asset for any security professional.
☆19Jul 15, 2024Updated last year
Alternatives and similar repositories for BountyDrive
Users that are interested in BountyDrive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- A Game Boy Color emulator with fast Link Cable and IR sensor support over TCP.☆22Updated this week
- This project aims to convert your Pinephone into a Rubber Ducky (hid gadget)☆14Feb 20, 2022Updated 4 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated 2 weeks ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆15Jan 24, 2023Updated 3 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Dec 19, 2023Updated 2 years ago
- ☆15Feb 6, 2025Updated last year
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆31Mar 7, 2026Updated 2 weeks ago
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Automatic Ducky Payload Generator☆16Nov 14, 2022Updated 3 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- PoC for CVE-2024-27130☆37May 17, 2024Updated last year
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- RouterBrute can Bruteforce/Dictionary attack the login for the Router's Login page☆16Mar 27, 2017Updated 8 years ago
- convert case style of words☆59Jan 12, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago
- Dockerized version of INetSim☆20Apr 24, 2023Updated 2 years ago
- A WiFi deauthentication tool written in C☆17Sep 20, 2019Updated 6 years ago
- Small social engineering tool written in python2☆20Nov 7, 2024Updated last year
- Open Source Transaction Importer for Up Bank to Actual Budget☆18Mar 2, 2026Updated 3 weeks ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capab…☆14Dec 15, 2023Updated 2 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Ultimate Wordlist for Web Content Discovery☆70Apr 28, 2025Updated 10 months ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- Download books from Perlego.com in PDF format☆13Sep 19, 2023Updated 2 years ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37May 1, 2023Updated 2 years ago
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default. 一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago