SumedhDawadi / wordlistsLinks
This is a collection of wordlists depending upon use cases
☆10Updated 2 years ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- Collection of scripts that I use while bug hunting☆48Updated 2 years ago
- A simple plugin to export JS files from one or multiple targets☆43Updated last year
- Tool for testing reflections in the HTTP responses☆60Updated 2 years ago
- Recon-Ninja☆87Updated last year
- Simple Automation script for juniper cve-2023-36845☆17Updated last year
- It grep subdomains, email/username, build custom wordlist etc from gau results☆48Updated 2 years ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated 2 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆26Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- I collected it to help the bug hunter get a reward☆58Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 9 months ago
- A fast tool to scan SAAS,PAAS App written in Go☆84Updated 2 years ago
- Most of the Google Acquisitions for Bug Bounty Hunter.☆63Updated 3 years ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Updated 2 years ago
- ☆67Updated 2 years ago
- ☆146Updated 2 years ago
- Tips For Bug Bounty Hunters☆86Updated 3 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆43Updated 2 years ago
- ☆40Updated 3 months ago
- Collection's of Tech Talk that are presented by me :)☆98Updated 8 months ago
- GraphQL automatic fuzzing tool☆16Updated 4 years ago
- ☆99Updated 2 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆42Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated 2 years ago
- Describe how to use ffuf different options with examples☆89Updated 2 years ago
- ☆83Updated 3 years ago
- Private Nuclei Templates☆100Updated 7 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Updated 4 years ago
- ☆127Updated 4 years ago