J1NNX26 / resources
A curated list of different pentesting resources
☆29Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for resources
- Check List☆72Updated 2 years ago
- ☆82Updated 3 years ago
- Summary of almost all paid bounty reports on H1☆38Updated 4 years ago
- It's collection of my learning during 100 days .☆34Updated 2 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆17Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆22Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆75Updated 2 years ago
- Automated Web Recon Shell Scripts☆50Updated 2 years ago
- AWS S3 open bucket poc automated script.☆55Updated 3 years ago
- Cool resources and content for bug bounty hunting.☆19Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- ☆32Updated last year
- ☆92Updated 2 years ago
- ☆45Updated 3 years ago
- I collected it to help the bug hunter get a reward☆55Updated 2 years ago
- ☆49Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- basic bbtools , buggy , not recommended to use☆34Updated 4 months ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆50Updated 2 years ago
- ☆52Updated 4 years ago
- Tips For Bug Bounty Hunters☆82Updated 2 years ago
- Collection of some pentesting and bugbounty resources☆42Updated 2 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆13Updated 5 years ago
- ☆100Updated last year
- Simple fork from degoogle original project with bug hunting purposes☆85Updated 2 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Updated 3 years ago
- Guide to SSRF☆65Updated last year