YashVardhanTrip / nuclei-templates-initial-accessLinks
A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial foothold in broad-scope Red-Team engagements, VAPT (Vulnerability Assessment and Penetration Testing), or general bug bounty programs.
☆18Updated last year
Alternatives and similar repositories for nuclei-templates-initial-access
Users that are interested in nuclei-templates-initial-access are comparing it to the libraries listed below
Sorting:
- Tools for bug bounty☆27Updated last year
- ☆18Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- Filter URLs to save your time.☆60Updated 2 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated 7 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆31Updated last month
- CrlfiX☆20Updated 4 months ago
- Bug Bounty Web and API Payloads☆35Updated 6 months ago
- Passive Web Vulnerability Detection Tool☆33Updated 3 weeks ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Updated last year
- Testing default web credentials☆33Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Updated 10 months ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆22Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated last month
- A proof of concept program that pulls and parses security.txt files at mass.☆28Updated 2 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆39Updated 2 years ago
- ☆46Updated 2 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Updated 4 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆20Updated last year
- Authorization-Nuclei-Templates☆39Updated 8 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Fast Bug Bounty Script☆37Updated 4 months ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆35Updated 9 months ago
- Supertruder but better☆32Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago