LuD1161 / HackingSimplified
This is where I share code/material shown in my videos
☆74Updated last year
Related projects ⓘ
Alternatives and complementary repositories for HackingSimplified
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆118Updated 2 years ago
- Just some public notes that can be useful and i want let the world knows.☆86Updated 4 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆72Updated 4 years ago
- ☆122Updated 4 years ago
- Signatures for jaeles scanner by @j3ssie☆116Updated 7 months ago
- ☆52Updated 4 years ago
- ☆74Updated 6 months ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆65Updated last year
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆95Updated 3 years ago
- Wwwordlist is a wordlist generator for pentesters and bug bounty hunters. It extracts words from HTML, URLs, JS/HTTP/input variables, quo…☆101Updated last year
- ☆20Updated 3 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆166Updated 4 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆71Updated 3 years ago
- s3 brute force tool☆44Updated 3 years ago
- My Tools For Bug Bounty☆63Updated last month
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- A script that can resolve an input file of domains and scan them with masscan☆155Updated 4 years ago
- Find subdomains and takeovers.☆84Updated last year
- Get the scope of your bugcrowd programs☆66Updated 3 years ago
- All known and unknown public POC's for wordpress themes and plugins☆78Updated 3 years ago
- Recon Custom WordList Ganerator☆56Updated 4 years ago
- ☆50Updated 3 years ago
- Bash Script to Hunt all the targets/Subdomains from Chaos by Project Discovery Team☆34Updated 4 years ago
- ☆57Updated last year
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Bug Bounty Dork☆67Updated 2 years ago
- Recon for Department of Defense HackerOne program☆45Updated 6 years ago