SirBugs / Priv8-Nuclei-TemplatesLinks
My Priv8 Nuclei Templates
☆327Updated last year
Alternatives and similar repositories for Priv8-Nuclei-Templates
Users that are interested in Priv8-Nuclei-Templates are comparing it to the libraries listed below
Sorting:
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆273Updated last week
- Automated Tool for Testing Header Based Blind SQL Injection☆287Updated 2 years ago
- i will upload more templates here to share with the comunity.☆557Updated last year
- ☆123Updated last month
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆215Updated last year
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆299Updated last year
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆179Updated 7 months ago
- ☆248Updated 4 years ago
- ♥☆150Updated 3 weeks ago
- XSS payloads for bypassing WAF. This repository is updating continuously.☆251Updated last year
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆393Updated 6 months ago
- De-clutter a list of URLs☆351Updated this week
- 10,000 H1 Disclosed Reports☆113Updated last year
- ☆412Updated last month
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆332Updated last year
- My Private Bug Hunting Methodology☆307Updated 10 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382Updated 2 years ago
- Never forget where you inject.☆274Updated last month
- A tool to find good RCE☆169Updated 3 years ago
- Finding XSS during recon☆264Updated 3 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆281Updated last year
- ☆160Updated 9 months ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆138Updated 7 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆545Updated 6 months ago
- Automated tool for domains & subdomains gathering☆189Updated 2 years ago
- Dorks for Bug Bounty Hunting☆187Updated last year
- ☆127Updated 4 years ago
- ☆398Updated last week
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆177Updated last year
- ☆146Updated 3 years ago