☆43Feb 26, 2019Updated 7 years ago
Alternatives and similar repositories for awesome-bug-bounty
Users that are interested in awesome-bug-bounty are comparing it to the libraries listed below
Sorting:
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Feb 26, 2026Updated last week
- Oneliners curated from my experience and from the internet☆23Feb 8, 2021Updated 5 years ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆104Mar 14, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Resources I consider useful for security research of web applications☆61Dec 15, 2020Updated 5 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- LFI/RFI Payload Tests Project☆36Oct 21, 2019Updated 6 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Highly recommended dorks for bug bounty☆19Oct 17, 2021Updated 4 years ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆11Jun 19, 2024Updated last year
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 4 months ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆32Feb 26, 2019Updated 7 years ago
- Extract Sensitive Keys, Secret, Token Or Interested thing from source☆52Jun 4, 2020Updated 5 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Application for logging HTTP and DNS Requests☆15May 14, 2021Updated 4 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- Generate wordlists for fuzzing API method names☆55Oct 16, 2020Updated 5 years ago
- My Payload Collection (XSS,SQL ...)☆14Jul 17, 2018Updated 7 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- Simple bash Oneliners to make life easier☆63Oct 16, 2020Updated 5 years ago
- Any Link Information Security, Bugbounty, Couse all☆15Oct 6, 2020Updated 5 years ago
- ☆18Oct 4, 2020Updated 5 years ago
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- Facebook Bug Bounties☆106Feb 24, 2021Updated 5 years ago
- A small collection of OSINT data collection tools.☆17Jun 14, 2019Updated 6 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆289Apr 24, 2023Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago