My personal bug bounty toolkit.
☆164Jun 18, 2024Updated last year
Alternatives and similar repositories for bug-bounty
Users that are interested in bug-bounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- ☆27Jan 25, 2020Updated 6 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- ☆11May 15, 2020Updated 5 years ago
- ☆57Sep 2, 2020Updated 5 years ago
- Secret and/or credential patterns used for gf.☆243Feb 10, 2023Updated 3 years ago
- The tools I have programmed to help me with bugbounty's☆117Oct 10, 2019Updated 6 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆148Dec 23, 2022Updated 3 years ago
- A fuzzer made in golang for finding issues like xss, lfi, rce, ssti...that detects issues using change in content length and verify it us…☆62Oct 25, 2020Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆96Jun 5, 2021Updated 4 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- Random Tools for Bug Bounty☆151Oct 15, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆129Jun 15, 2020Updated 5 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆56Mar 23, 2021Updated 5 years ago
- A Python tool to automate some dorking stuff to find information disclosures.☆155Jul 3, 2024Updated last year
- Signatures for jaeles scanner by @j3ssie☆117Apr 20, 2024Updated last year
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Dec 13, 2022Updated 3 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 4 years ago
- Just some public notes that can be useful and i want let the world knows.☆89Oct 18, 2020Updated 5 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆128Mar 2, 2022Updated 4 years ago
- Simple fork from degoogle original project with bug hunting purposes☆91Jun 15, 2022Updated 3 years ago
- Quick script to install all the required tools over a VPS (tested on DEBIAN)☆78Sep 27, 2021Updated 4 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- You can read the writeup on this script here☆192Sep 30, 2021Updated 4 years ago
- ☆21Aug 28, 2022Updated 3 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆107Aug 4, 2020Updated 5 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆289Apr 24, 2023Updated 2 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 3 years ago
- Extract JavaScript files from burp suite project with ease.☆97Feb 19, 2022Updated 4 years ago
- Script to test open Akamai ARL vulnerability.☆69Aug 11, 2021Updated 4 years ago
- Notes from OSCP, CTF, security adventures, etc...☆66Feb 6, 2024Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆450Jul 21, 2020Updated 5 years ago
- Gathers urls from common crawl☆34Nov 9, 2019Updated 6 years ago