BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for performing attacks (google dorking, sqli, xss), reporting, and managing VPN/proxy settings, making it an indispensable asset for any security professional.
☆18Jul 15, 2024Updated last year
Alternatives and similar repositories for BountyDrive
Users that are interested in BountyDrive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common User Passwords Profiler (CUPP) in Rust☆26Aug 8, 2024Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Jun 25, 2024Updated last year
- This tool presents a novel approach to bolstering network protocol verification by integrating the Shadow network simulator with the Ivy …☆43Apr 28, 2026Updated last week
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆122Mar 10, 2025Updated last year
- A Game Boy Color emulator with fast Link Cable and IR sensor support over TCP.☆22Apr 24, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- Passively check for XSS character encodings☆19Mar 9, 2026Updated last month
- ☆18Sep 23, 2024Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Dec 19, 2023Updated 2 years ago
- ☆15Feb 6, 2025Updated last year
- ☆18May 27, 2021Updated 4 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated last month
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- APKdgo is a command-line tool for downloading Android APK files from multiple sources and app stores, making it easy to fetch packages.☆30Mar 10, 2026Updated last month
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- TextGPT - SMS <-> LLM Bridge. Twilio/Telnyx <-> OpenAI. Convenient Conversational AI in a Text Message. Infrastructure built with AWS CDK☆15Jul 13, 2023Updated 2 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆25Updated this week
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆30Feb 10, 2024Updated 2 years ago
- convert case style of words☆62Jan 12, 2024Updated 2 years ago
- A fuzzing framework targeted at MQTT brokers. Modeled as a finite state machine (using Markov Modeling).☆37Jul 11, 2023Updated 2 years ago
- A native symbolic execution engine for WebAssembly☆48Mar 23, 2026Updated last month
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago
- Dockerized version of INetSim☆20Apr 24, 2023Updated 3 years ago
- Small social engineering tool written in python2☆20Nov 7, 2024Updated last year
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆32Jul 22, 2022Updated 3 years ago
- Transformer Neural Network for Dynamic Malware Detection☆41Mar 5, 2026Updated 2 months ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capab…☆13Dec 15, 2023Updated 2 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Ultimate Wordlist for Web Content Discovery☆70Apr 28, 2025Updated last year