JoKeR7-Mo2a / EasyHuntingLinks
A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, integrating diverse tools, and delivering AI-powered insights.
☆13Updated last month
Alternatives and similar repositories for EasyHunting
Users that are interested in EasyHunting are comparing it to the libraries listed below
Sorting:
- ☆20Updated last month
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆87Updated 9 months ago
- ☆26Updated last year
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆22Updated 11 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆107Updated last year
- ☆59Updated 4 months ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Updated last year
- ☆19Updated last year
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆13Updated 4 years ago
- ☆21Updated last year
- ☆24Updated 3 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆246Updated 5 months ago
- ☆112Updated last month
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆52Updated 3 months ago
- A highly efficient and powerful Go script designed to detect sensitive data leaks in JavaScript files.☆22Updated 2 months ago
- My Notes on Regular Expressions for AWAE/OSWE.☆36Updated 2 years ago
- ☆107Updated 2 years ago
- ☆25Updated last year
- ☆37Updated 9 months ago
- All Items Related to bug bounty☆13Updated 3 months ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆33Updated 2 years ago
- ☆140Updated 9 months ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆61Updated 2 years ago
- ♥☆161Updated 2 months ago
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆36Updated 3 months ago
- ☆82Updated 2 months ago
- Reflector: A tool to check for reflected query parameter values.☆12Updated 2 years ago
- Here you can find mostly all disclosed h1 reports☆17Updated 6 years ago
- A Series of Tweets☆15Updated last year