MR-pentestGuy / nuclei-templatesLinks
My own Custom nuclei templates
☆25Updated 3 years ago
Alternatives and similar repositories for nuclei-templates
Users that are interested in nuclei-templates are comparing it to the libraries listed below
Sorting:
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆11Updated 3 years ago
- Automated blind-xss search for Burp Suite☆23Updated 3 years ago
- ☆16Updated 2 weeks ago
- Magic Header Blind Xss tool (deliver blind xss payloads in request headers).☆26Updated 4 years ago
- Some wordlists collected form github to all bug bounty hunters.☆34Updated 4 years ago
- ☆34Updated 3 years ago
- Cool HackerOne Reports☆22Updated 2 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Updated 3 years ago
- ☆29Updated last year
- ☆17Updated last year
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Updated 3 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Updated 2 years ago
- basic bbtools , buggy , not recommended to use☆35Updated 6 months ago
- IIS shortname scanner + bruteforce☆53Updated last year
- Some Tutorials and Things to Help Bug Hunter☆29Updated 4 years ago
- ☆22Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆12Updated 11 months ago
- output burp body only and auto pretiffy☆16Updated 3 months ago
- ☆7Updated 2 years ago
- #JavascriptRecon #bugbounty☆21Updated 3 years ago
- Automation for Open Threat Exchange☆25Updated last year
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19Updated 3 years ago
- ☆12Updated 3 years ago
- commands☆27Updated 4 years ago
- Stuff for bug bounty☆32Updated 2 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆59Updated 3 years ago
- Authorization-Nuclei-Templates☆40Updated 10 months ago
- Some of the gf patterns which i use☆44Updated 3 years ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year