This is a container of web applications that work with OWASP Bug Bounty for Projects
☆34Apr 28, 2025Updated 10 months ago
Alternatives and similar repositories for OWASPBugBounty
Users that are interested in OWASPBugBounty are comparing it to the libraries listed below
Sorting:
- A tool to generate statistics and help manage bug bounty reports in HackerOne.☆22Mar 18, 2020Updated 5 years ago
- [WIP] Directus 7 Admin Application☆12May 22, 2018Updated 7 years ago
- A Java web knocking tool for sending a single HTTP/S request to your web server in order to authorise the execution of a premeditated Ope…☆15May 19, 2015Updated 10 years ago
- Automate your Kali Linux Penetration Testing toolchain☆31May 24, 2015Updated 10 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- Forked MaruOS installer for Nethunter☆17Feb 16, 2018Updated 8 years ago
- Ionic 3 UI/UX Starter App Theme & Template - Free Download☆15Oct 10, 2023Updated 2 years ago
- NetHunter android application☆21Nov 4, 2017Updated 8 years ago
- A list of collected articles and resources from the website Peerlyst☆17Dec 14, 2016Updated 9 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Jan 9, 2019Updated 7 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Black Hat Python Labs☆103Apr 29, 2019Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- OWASp PureCaptcha project☆25Dec 15, 2019Updated 6 years ago
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- ☆22Apr 15, 2024Updated last year
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- XSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in H…☆24Jul 23, 2014Updated 11 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. G…☆27Sep 25, 2012Updated 13 years ago
- Using Hotel Data to predict High Value And Potential VIP Guests☆12Dec 27, 2021Updated 4 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- Project tutorial demonstrating how to add Google fonts to a react project☆12Oct 2, 2020Updated 5 years ago
- My Scripts for template VMs☆15Jan 22, 2026Updated last month
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Feb 23, 2026Updated last week
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- ☆77Jul 4, 2019Updated 6 years ago
- a Cordova mobile app built with Ionic framework & AngularJS (dedicated to the humanist writer and thinker Mario Rodriguez Cobos, aka "Si…☆68Mar 28, 2014Updated 11 years ago