SirBugs / subguess
Generating Sub-Sub-Subdomain + validating all of them
☆9Updated last year
Related projects: ⓘ
- Automated Recon Tool Installer☆16Updated 2 years ago
- ☆13Updated 7 months ago
- List of custom Nuclei templates☆15Updated 10 months ago
- ☆13Updated last year
- Automate bug bounty recon using bash alias☆14Updated last month
- ☆19Updated 3 years ago
- Passively check for XSS character encodings☆20Updated last year
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆17Updated last year
- Quick tool to create custom wordlists like how fuzzers work☆11Updated 11 months ago
- ☆13Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆8Updated 4 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆9Updated last year
- A Collection of Wordlists for Penetration Testing☆11Updated last month
- offy is a tool for bugbounty hunters to save money in their EC2 instances☆12Updated last year
- ☆12Updated 2 years ago
- ☆10Updated 2 years ago
- ☆12Updated 2 years ago
- ☆18Updated 10 months ago
- ☆10Updated last year
- Find CVEs that don't have a Detectify modules.☆21Updated last year
- ☆21Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 3 years ago
- A simple utility to generate domain names with all possible TLDs☆23Updated last year
- ☆24Updated this week
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated last year
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆13Updated 3 months ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆8Updated 2 years ago
- ☆10Updated 3 years ago
- Scan Wordpress Servers for Access Control Issues☆10Updated last year
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆15Updated 4 years ago