JakobTheDev / bug-bounty
My personal bug bounty toolkit.
☆163Updated 10 months ago
Alternatives and similar repositories for bug-bounty:
Users that are interested in bug-bounty are comparing it to the libraries listed below
- XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|ID…☆336Updated last year
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆442Updated 4 years ago
- Python library and CLI for the Bug Bounty Recon API☆224Updated 3 years ago
- information gathering☆275Updated last year
- Simple shell script for automated domain recognition with some tools☆300Updated 4 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆318Updated 3 weeks ago
- A DNS Bruteforcing Wordlist Generator☆356Updated 2 years ago
- ☆373Updated 3 years ago
- Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @J…☆202Updated 2 years ago
- ☆126Updated 4 years ago
- Automating XSS using Bash☆354Updated last year
- Trying to make automated recon for bug bounties☆253Updated 3 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- Random utilities from my security projects that might be useful to others☆179Updated 2 months ago
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- ☆210Updated 3 years ago
- Yet another subdomain finder☆203Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated last year
- The project contains multiple shell scripts for automating the tasks during recon.☆175Updated last year
- Simple recon using multiple tools!☆164Updated 3 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆211Updated 5 years ago
- ☆425Updated 2 years ago
- You can read the writeup on this script here☆193Updated 3 years ago
- Secret and/or credential patterns used for gf.☆241Updated 2 years ago
- Web Security Checklist (Bug Bounty & Pentesting)☆160Updated 2 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆364Updated 2 years ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆147Updated 4 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆236Updated 4 years ago
- Recon Methodology☆91Updated 3 years ago