BugBounty-Recon-Methodology
☆268May 4, 2026Updated this week
Alternatives and similar repositories for BugBounty-Recon-Methodology
Users that are interested in BugBounty-Recon-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 4 months ago
- Rust-powered HTTP Request Smuggling Scanner.☆117May 2, 2026Updated last week
- The Java Burp Extension version of my BypassFuzzer tool☆30Apr 22, 2026Updated 2 weeks ago
- NAIJA OSINT INTEL is a comprehensive open-source intelligence gathering tool specifically designed for Nigerian cybersecurity professiona…☆18Aug 21, 2025Updated 8 months ago
- ☆54Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆124Dec 29, 2025Updated 4 months ago
- Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.☆254Apr 17, 2026Updated 3 weeks ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆35Jul 13, 2025Updated 9 months ago
- the POC of package.json RCE☆27Jun 24, 2025Updated 10 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- MCP server that connects AI assistants to HackerOne for bug bounty hunting☆288Apr 7, 2026Updated last month
- ☆37Updated this week
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆19Feb 26, 2026Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆226Sep 25, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆53Oct 1, 2025Updated 7 months ago
- ☆46Nov 21, 2025Updated 5 months ago
- AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude…☆2,027Updated this week
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆44Dec 4, 2025Updated 5 months ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆22Apr 2, 2026Updated last month
- Simple XSS vulnerability checker tool very useful with xsschecker.☆27Nov 21, 2025Updated 5 months ago
- Monitor your targets and hunt fresh assets in real time.☆177Feb 23, 2026Updated 2 months ago
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆28Mar 31, 2025Updated last year
- ☆13Jun 11, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Official Ansible collection for Scale Computing SC//HyperCore (HC3) v1 API☆12Jan 29, 2026Updated 3 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 3 months ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆104Feb 22, 2026Updated 2 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆38Dec 12, 2023Updated 2 years ago
- A resources for who want to learn and get deep into client-side bugs☆536Dec 8, 2024Updated last year
- My new Dotfiles with the Catppuccin theme☆11Sep 27, 2023Updated 2 years ago
- ☆25Jan 15, 2024Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Ant…☆529Apr 27, 2026Updated last week
- Go Ransomware (YouTube)☆22Nov 17, 2022Updated 3 years ago
- ☆598Feb 3, 2026Updated 3 months ago
- ☆71May 5, 2025Updated last year
- Production-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&C…☆540May 2, 2026Updated last week
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆1,275Sep 5, 2025Updated 8 months ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago