YashVardhanTrip / nuclei-templates-initial-access
A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial foothold in broad-scope Red-Team engagements, VAPT (Vulnerability Assessment and Penetration Testing), or general bug bounty programs.
☆18Updated 10 months ago
Alternatives and similar repositories for nuclei-templates-initial-access:
Users that are interested in nuclei-templates-initial-access are comparing it to the libraries listed below
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- Fast Bug Bounty Script☆37Updated 2 months ago
- ☆18Updated 2 years ago
- This Python script automates the process of identifying vulnerabilities in Firebase configurations extracted from APK files.☆29Updated last week
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆70Updated last week
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- A solid recon tool I use personally.☆30Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆46Updated last month
- Tools for bug bounty☆27Updated last year
- Filter URLs to save your time.☆59Updated 2 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆19Updated last year
- Passive Web Vulnerability Detection Tool☆31Updated 3 months ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆20Updated last year
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆40Updated 11 months ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- Supertruder but better☆32Updated 2 years ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆41Updated 5 months ago
- A simple plugin to export JS files from one or multiple targets☆41Updated last year
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆34Updated 7 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated last year
- Host Header Vulnerability Scanner Automated Tool☆22Updated last year
- Bug Bounty Web and API Payloads☆34Updated 5 months ago
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 7 months ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Updated 8 months ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆20Updated last month
- Authorization-Nuclei-Templates☆39Updated 6 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆90Updated 8 months ago
- ☆12Updated 3 years ago