☆70Aug 19, 2024Updated last year
Alternatives and similar repositories for Elsfa7110-Oneliner-bughunting
Users that are interested in Elsfa7110-Oneliner-bughunting are comparing it to the libraries listed below
Sorting:
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- Collect XSS vulnerable parameters from entire domain.☆155Jul 29, 2022Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆500Jun 28, 2025Updated 8 months ago
- Automatically look for paramater reflections in the HTTP response☆17Apr 30, 2025Updated 10 months ago
- A collection of one-liners for bug bounty hunting.☆1,427Jan 21, 2025Updated last year
- Never forget where you inject.☆298Aug 15, 2025Updated 6 months ago
- oneliner commands for bug bounties☆461Jul 25, 2022Updated 3 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆39Oct 17, 2024Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 11 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆139Nov 9, 2024Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,077Jul 29, 2024Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆10Dec 2, 2021Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- CLI for the Akamai's mPulse Query API☆10Apr 22, 2025Updated 10 months ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- ☆168Dec 27, 2024Updated last year
- web cache deception detect☆38Jan 9, 2026Updated 2 months ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Mobile Application Vulnerability Scanner☆26Feb 26, 2025Updated last year
- A repository that includes all the important wordlists used while bug hunting.☆1,379Mar 11, 2023Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,530Updated this week
- An easy to use character based menu program written in C - use it to automate some of those regular tasks. Takes a simple input text fil…☆13Nov 19, 2025Updated 3 months ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Simple username generator based on a list of name and surname☆13May 20, 2021Updated 4 years ago