This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.
☆13Feb 19, 2021Updated 5 years ago
Alternatives and similar repositories for Bug-Bounty-tips-from-Twitter
Users that are interested in Bug-Bounty-tips-from-Twitter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 5, 2021Updated 4 years ago
- PS one-liner cmdlets for Windows security☆26Feb 13, 2021Updated 5 years ago
- Simple automation & administration tools for Linux☆26May 24, 2021Updated 4 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- for intigriti web challenges☆16Apr 11, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 11 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 3 weeks ago
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 7 months ago
- ☆10May 6, 2017Updated 8 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 2 months ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 基于wappalyzer指纹库、chromedp框架对网站进行指纹识别☆13Mar 17, 2025Updated last year
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- htop for Windows . TUI system monitor with per-core CPU bars, memory/swap/network, tree view, process kill, 7 color schemes, mouse suppor…☆61Mar 19, 2026Updated last week
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆16Oct 18, 2024Updated last year
- A project based intro to game development using the Unity game engine☆34Aug 26, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 2 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆32May 8, 2020Updated 5 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Sending file through ICMP packet using PING☆22Jul 18, 2024Updated last year
- A tool for decrypting the XOR cipher. It will find the key length and the key itself automatically.☆29Nov 11, 2023Updated 2 years ago
- Nuclei Templates☆25Oct 17, 2024Updated last year
- Code repository for WiFi Hacking: Wireless Penetration Testing for Beginners, published by Packt☆15Jan 30, 2023Updated 3 years ago
- A list of security courses at colleges and universities☆12Aug 9, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆43Jan 31, 2023Updated 3 years ago
- CEHv12 Notes☆15Jun 11, 2023Updated 2 years ago
- ☆35Nov 14, 2025Updated 4 months ago
- ☆14May 5, 2024Updated last year
- OSINT Framework☆19Mar 31, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆35Feb 9, 2024Updated 2 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago