IamLucif3r / Buffer-Overflow
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
☆16Updated 3 years ago
Alternatives and similar repositories for Buffer-Overflow:
Users that are interested in Buffer-Overflow are comparing it to the libraries listed below
- Filter URLs to save your time.☆59Updated 2 years ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Here Are Some Bug Bounty Resource From Twitter☆89Updated 2 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆61Updated last month
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆65Updated last year
- ☆50Updated 4 years ago
- Advanced Reconnaissance and Web Application Discovery☆79Updated 3 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆65Updated 3 years ago
- ☆63Updated 7 months ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated last year
- My Notes & Resources Of Bug Bounty Checklists☆64Updated 3 months ago
- ☆111Updated 2 years ago
- ☆100Updated last year
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆99Updated 5 months ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆18Updated last year
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆18Updated 10 months ago
- My small collection of reports templates☆77Updated 5 years ago
- Check List☆78Updated 2 years ago
- ☆131Updated 3 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆58Updated 2 years ago
- Fast Bug Bounty Script☆37Updated 2 months ago
- Useful Github Dorks for BugBounty -☆63Updated 2 years ago
- ☆104Updated last year
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆65Updated this week
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆38Updated 3 years ago
- Private Nuclei Templates☆97Updated last month