ElNiak / BountyDriveLinks
BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for performing attacks (google dorking, sqli, xss), reporting, and managing VPN/proxy settings, making it an indispensable asset for any security professional.
☆18Updated 11 months ago
Alternatives and similar repositories for BountyDrive
Users that are interested in BountyDrive are comparing it to the libraries listed below
Sorting:
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆32Updated last month
- Web Path Finder☆61Updated last year
- Legba recipes.☆50Updated 10 months ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆69Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆31Updated 2 months ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆12Updated 8 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆48Updated 8 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 10 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆42Updated 4 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Passive Web Vulnerability Detection Tool☆34Updated 2 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated last year
- Enumeration & fingerprint tool☆25Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago