YashVardhanTrip / nuclei-templates-initial-access
A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial foothold in broad-scope Red-Team engagements, VAPT (Vulnerability Assessment and Penetration Testing), or general bug bounty programs.
☆18Updated 11 months ago
Alternatives and similar repositories for nuclei-templates-initial-access:
Users that are interested in nuclei-templates-initial-access are comparing it to the libraries listed below
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- Web Crawler for Identifying Entry Points☆11Updated last year
- Tools for bug bounty☆27Updated last year
- Passive Web Vulnerability Detection Tool☆31Updated this week
- ☆18Updated 2 years ago
- Filter URLs to save your time.☆60Updated 2 years ago
- ☆30Updated 2 weeks ago
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 8 months ago
- ☆41Updated last week
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 6 months ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆40Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆21Updated last month
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆20Updated last year
- Fast Bug Bounty Script☆37Updated 3 months ago
- A solid recon tool I use personally.☆30Updated last year
- Collection of over 9000 xss payloads | heavy xss collection☆13Updated 2 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆20Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆91Updated last month
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆34Updated 8 months ago
- ☆46Updated last month
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Updated 9 months ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆41Updated 6 months ago
- Web cache poisoning vulnerability scanner.☆66Updated 3 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated 6 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated 11 months ago
- ☆55Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆31Updated last year