BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for performing attacks (google dorking, sqli, xss), reporting, and managing VPN/proxy settings, making it an indispensable asset for any security professional.
☆18Jul 15, 2024Updated last year
Alternatives and similar repositories for BountyDrive
Users that are interested in BountyDrive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆14Jan 7, 2024Updated 2 years ago
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy …☆43Apr 7, 2026Updated last week
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆122Mar 10, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This project aims to convert your Pinephone into a Rubber Ducky (hid gadget)☆14Feb 20, 2022Updated 4 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last month
- ☆18Sep 23, 2024Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- ☆15Feb 6, 2025Updated last year
- Symbolic Execution Benchmarks for Ethereum Smart Contracts☆22Aug 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- Welcome to the ultimate list of resources for formal verification techniques and tools. This repository aims to provide an organized coll…☆109Mar 1, 2026Updated last month
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated 2 weeks ago
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated 2 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC for CVE-2024-27130☆37May 17, 2024Updated last year
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆30Feb 10, 2024Updated 2 years ago
- convert case style of words☆59Jan 12, 2024Updated 2 years ago
- A fuzzing framework targeted at MQTT brokers. Modeled as a finite state machine (using Markov Modeling).☆38Jul 11, 2023Updated 2 years ago
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago
- Dockerized version of INetSim☆20Apr 24, 2023Updated 2 years ago
- A WiFi deauthentication tool written in C☆17Sep 20, 2019Updated 6 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Transformer Neural Network for Dynamic Malware Detection☆40Mar 5, 2026Updated last month
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Simple Python script to interact with the Hacker Target API for IP Tools.☆25Jun 15, 2023Updated 2 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Ultimate Wordlist for Web Content Discovery☆70Apr 28, 2025Updated 11 months ago