Mostafa-Elguerdawi / Automation_Bug_Hunting
☆68Updated 2 years ago
Alternatives and similar repositories for Automation_Bug_Hunting:
Users that are interested in Automation_Bug_Hunting are comparing it to the libraries listed below
- Fast Bug Bounty Script☆37Updated 3 months ago
- Private Nuclei Templates☆99Updated 2 months ago
- ☆78Updated 2 years ago
- A Lightning-Fast DNS Resolver written in Rust 🦀☆67Updated 5 months ago
- Tool for testing reflections in the HTTP responses☆60Updated last year
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 4 months ago
- get all nuclei temp from emad shanab repo in one run☆35Updated last year
- ☆158Updated last year
- Script that download 37+ open source nuclei templates☆43Updated 2 years ago
- Authorization-Nuclei-Templates☆39Updated 7 months ago
- This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research☆44Updated 2 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆20Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆105Updated 3 years ago
- ☆34Updated 2 years ago
- ☆113Updated 2 years ago
- Tips For Bug Bounty Hunters☆85Updated 2 years ago
- A path-normalization pentesting tool.☆126Updated last year
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- A simple plugin to export JS files from one or multiple targets☆41Updated last year
- A standalone Blind XSS Script.☆47Updated 2 years ago
- Xssor.go is a xss reflections checker for urls☆71Updated 2 years ago
- ☆39Updated last month
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆138Updated last year
- Describe how to use ffuf different options with examples☆87Updated 2 years ago
- This Python script automates the process of identifying vulnerabilities in Firebase configurations extracted from APK files.☆43Updated last month
- ☆68Updated last year
- All Type of Payloads☆136Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆123Updated last month