R-s0n / ars0n-framework-v2View external linksLinks
Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros
☆564Feb 7, 2026Updated last week
Alternatives and similar repositories for ars0n-framework-v2
Users that are interested in ars0n-framework-v2 are comparing it to the libraries listed below
Sorting:
- A Modern Framework for Bug Bounty Hunting☆652Feb 18, 2025Updated 11 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 5 months ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,515Dec 7, 2025Updated 2 months ago
- A resources for who want to learn and get deep into client-side bugs☆419Dec 8, 2024Updated last year
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆14Apr 10, 2025Updated 10 months ago
- A collection of notes for bug bounty hunting☆279Sep 29, 2023Updated 2 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- ☆548Feb 3, 2026Updated last week
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆48Mar 23, 2023Updated 2 years ago
- ☆475Aug 21, 2025Updated 5 months ago
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- Script to automate bypassing 403 forbidden status code☆24Jun 18, 2025Updated 7 months ago
- ☆101Apr 4, 2025Updated 10 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆198Aug 13, 2024Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆218Sep 25, 2025Updated 4 months ago
- AI/LLM local model integration for analysis of reconftw results☆91May 3, 2025Updated 9 months ago
- ☆232Mar 13, 2025Updated 11 months ago
- ♥☆176Sep 7, 2025Updated 5 months ago
- Learning materials, vulnerable demo app, and scripts related to the Client-Side Injections Part II YouTube Video☆29Oct 25, 2025Updated 3 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆64Feb 3, 2026Updated last week
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆28Jul 10, 2025Updated 7 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆719Dec 26, 2025Updated last month
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆181Feb 10, 2025Updated last year
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆111Feb 22, 2022Updated 3 years ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆94Updated this week
- Tool to scan servers and hosts using dynamic paths.☆21Oct 1, 2025Updated 4 months ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆682Jul 10, 2024Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,895Oct 4, 2025Updated 4 months ago
- ☆42Aug 12, 2025Updated 6 months ago
- An advanced XSS vulnerability scanner.☆11Feb 24, 2025Updated 11 months ago
- A curated list of various bug bounty tools☆5,774Updated this week
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,532Aug 6, 2023Updated 2 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- Browser-based iOS IPA security analyzer.☆48Jan 12, 2026Updated last month