JoKeR7-Mo2a / EasyHuntingLinks
A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, integrating diverse tools, and delivering AI-powered insights.
☆13Updated last month
Alternatives and similar repositories for EasyHunting
Users that are interested in EasyHunting are comparing it to the libraries listed below
Sorting:
- ☆20Updated 2 months ago
- ☆26Updated last year
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆23Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆87Updated 10 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆110Updated last year
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆15Updated 4 years ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Updated last year
- ☆119Updated 2 months ago
- ☆21Updated last year
- ☆38Updated 10 months ago
- ☆60Updated 4 months ago
- ☆19Updated last year
- ☆143Updated 10 months ago
- ☆24Updated 3 years ago
- Reflector: A tool to check for reflected query parameter values.☆12Updated 2 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆288Updated 6 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆96Updated 3 months ago
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆38Updated 4 months ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆53Updated 3 months ago
- My Notes on Regular Expressions for AWAE/OSWE.☆37Updated 2 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- ☆11Updated last year
- Active monitoring bug bounty programs tool☆44Updated 2 weeks ago
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆19Updated 5 months ago
- ☆25Updated last year
- ☆24Updated 8 months ago
- ☆85Updated 3 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Updated 3 weeks ago
- ☆109Updated 2 years ago
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆34Updated 3 months ago