MR-pentestGuy / nuclei-templatesLinks
My own Custom nuclei templates
☆25Updated 3 years ago
Alternatives and similar repositories for nuclei-templates
Users that are interested in nuclei-templates are comparing it to the libraries listed below
Sorting:
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆11Updated 3 years ago
- ☆16Updated 5 months ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- Some wordlists collected form github to all bug bounty hunters.☆31Updated 3 years ago
- Automated blind-xss search for Burp Suite☆23Updated 3 years ago
- ☆7Updated 2 years ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆26Updated 4 years ago
- ☆28Updated last year
- ☆17Updated last year
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Updated 3 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Updated 2 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Updated 3 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆12Updated 10 months ago
- ☆21Updated 2 years ago
- Script that download 37+ open source nuclei templates☆44Updated 2 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19Updated 3 years ago
- ☆12Updated 3 years ago
- Authorization-Nuclei-Templates☆39Updated 9 months ago
- ☆34Updated 2 years ago
- output burp body only and auto pretiffy☆15Updated last month
- #JavascriptRecon #bugbounty☆21Updated 3 years ago
- Power of .bashrc and .bash_aliases☆30Updated 2 years ago
- Some Tutorials and Things to Help Bug Hunter☆29Updated 4 years ago
- Cool HackerOne Reports☆22Updated 2 years ago
- IIS shortname scanner + bruteforce☆52Updated last year
- A very simple AEM detector written in rust.🦀☆20Updated last year
- ☆89Updated 3 years ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year
- Automation for Open Threat Exchange☆25Updated last year
- Tool for testing reflections in the HTTP responses☆60Updated 2 years ago