JakobTheDev / bug-bountyLinks
My personal bug bounty toolkit.
☆164Updated last year
Alternatives and similar repositories for bug-bounty
Users that are interested in bug-bounty are comparing it to the libraries listed below
Sorting:
- Simple recon using multiple tools!☆165Updated 4 years ago
- information gathering☆281Updated 6 months ago
- ☆130Updated 5 years ago
- ☆213Updated 4 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆288Updated 2 years ago
- Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @J…☆214Updated 3 years ago
- ☆375Updated 4 years ago
- Automating XSS using Bash☆361Updated 2 weeks ago
- Random utilities from my security projects that might be useful to others☆183Updated last year
- Python library and CLI for the Bug Bounty Recon API☆230Updated 4 years ago
- Burp Extension for easily creating Wordlists☆215Updated 4 years ago
- Web Security Checklist (Bug Bounty & Pentesting)☆170Updated 7 months ago
- Random Tools for Bug Bounty☆150Updated 3 years ago
- PDF slides☆246Updated 4 years ago
- XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|ID…☆347Updated 2 years ago
- The tools I have programmed to help me with bugbounty's☆118Updated 6 years ago
- A list of resources for those interested in getting started in bug bounties inspired from https://github.com/nahamsec/Resources-for-Beg…☆169Updated 5 years ago
- ☆95Updated 6 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Updated 5 years ago
- Yet another subdomain finder☆209Updated 6 years ago
- A collection of templates for bug bounty reporting☆440Updated last month
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆159Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆114Updated 8 years ago
- Secret and/or credential patterns used for gf.☆243Updated 3 years ago
- ☆435Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆451Updated 5 years ago
- ☆87Updated 4 years ago
- ☆101Updated 2 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆320Updated 3 weeks ago
- A DNS Bruteforcing Wordlist Generator☆362Updated 2 years ago