ElNiak / BountyDriveLinks
BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for performing attacks (google dorking, sqli, xss), reporting, and managing VPN/proxy settings, making it an indispensable asset for any security professional.
☆19Updated last year
Alternatives and similar repositories for BountyDrive
Users that are interested in BountyDrive are comparing it to the libraries listed below
Sorting:
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- my own 2fa bypass methodolgy☆27Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Web Path Finder☆60Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- External recon toolkit☆54Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆26Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated 2 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 7 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 5 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- ☆19Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated 2 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 2 months ago