A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
☆1,788Sep 29, 2025Updated 5 months ago
Alternatives and similar repositories for google-dorks-bug-bounty
Users that are interested in google-dorks-bug-bounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,220Jan 24, 2026Updated 2 months ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,911Dec 8, 2025Updated 3 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,672Sep 8, 2023Updated 2 years ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,275Feb 10, 2024Updated 2 years ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,574Mar 8, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- declutters url lists for crawling/pentesting☆1,538Feb 23, 2025Updated last year
- ChatGPT Prompts for Bug Bounty & Pentesting☆698Oct 3, 2023Updated 2 years ago
- My Priv8 Nuclei Templates☆340May 12, 2024Updated last year
- Top disclosed reports from HackerOne☆5,426Feb 28, 2026Updated 3 weeks ago
- 1337 Wordlists for Bug Bounty Hunting☆937Updated this week
- how to look for Leaked Credentials !☆1,035May 6, 2024Updated last year
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,953Oct 4, 2025Updated 5 months ago
- A repository that includes all the important wordlists used while bug hunting.☆1,386Mar 11, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,776Oct 7, 2025Updated 5 months ago
- ☆865Dec 26, 2025Updated 3 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,826Aug 20, 2025Updated 7 months ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,581Jun 6, 2022Updated 3 years ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆502Jun 28, 2025Updated 8 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,581Aug 6, 2023Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,785May 22, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,113Aug 14, 2024Updated last year
- Mind-Maps of Several Things☆2,632Jun 29, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A curated list of various bug bounty tools☆5,853Feb 9, 2026Updated last month
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,860Mar 20, 2026Updated last week
- De-clutter a list of URLs☆385Mar 8, 2026Updated 2 weeks ago
- A collection of one-liners for bug bounty hunting.☆1,431Jan 21, 2025Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,057Jun 25, 2025Updated 9 months ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,254Mar 13, 2026Updated 2 weeks ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- Subdomain takeover vulnerability checker☆1,531Sep 10, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,533Mar 8, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,088Jul 29, 2024Updated last year
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆936Aug 24, 2023Updated 2 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,823Jun 9, 2024Updated last year
- Hidden parameters discovery suite☆2,038Sep 8, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,371Mar 20, 2026Updated last week
- An IIS short filename enumeration tool☆1,132Nov 25, 2024Updated last year
- Nuclei Templates Collection☆1,085Dec 25, 2025Updated 3 months ago