Hacking-Notes / Note-Taking-Solution-Burp-Suite-Obsidian-Integration
Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven note-taking method to streamline bug bounty workflows and enhance productivity. Save time and stay organized!
☆13Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Note-Taking-Solution-Burp-Suite-Obsidian-Integration
- Filter URLs to save your time.☆59Updated 2 years ago
- convert case style of words☆25Updated 10 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆46Updated last month
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Updated last year
- ☆47Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆42Updated 3 months ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆32Updated 2 months ago
- Tool to query the RIPE database☆11Updated 4 months ago
- RobinHood - Bug Hunting Recon Automation Script☆32Updated 2 years ago
- Custom Trickest Workflows☆13Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆21Updated 3 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆49Updated last month
- A really fast http prober.☆39Updated 9 months ago
- Script to read input from stdin and encode it☆18Updated last year
- Gather results of dorks across a number of search engines☆78Updated this week
- DNS resolution tracing tool☆34Updated 3 years ago
- bash script for automating subdomain enumeration process either passive or active☆26Updated last year
- ☆64Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆24Updated 5 months ago
- ☆30Updated 2 years ago
- This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts…☆19Updated 3 months ago
- ☆34Updated last week
- ☆42Updated last year
- ☆18Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆27Updated 11 months ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆30Updated 7 months ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆39Updated last year
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆36Updated last year