a-chernobrov / for_newby_in_bug_bountyLinks
Репозиторий с материалами для развития в Bug Bounty
☆11Updated last year
Alternatives and similar repositories for for_newby_in_bug_bounty
Users that are interested in for_newby_in_bug_bounty are comparing it to the libraries listed below
Sorting:
- Check bitrix vulnerabilities☆86Updated last year
- ☆133Updated 4 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆172Updated last week
- Friendly graphical output of the nmap tool that allows filtering by open ports☆187Updated 3 years ago
- Google IP Search Engine☆166Updated 3 years ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆119Updated 10 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆28Updated 7 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆147Updated this week
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated 11 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆380Updated 5 months ago
- Some nuclei templates for pentest CMS Bitrix☆36Updated 5 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated last year
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆211Updated 7 months ago
- Hackings style defence tricks☆51Updated last week
- Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.☆55Updated 7 months ago
- Light-weight web security scanner☆150Updated 8 months ago
- Generates a DEBUG PIN for flask applications based on Werkzeug☆15Updated last year
- A monster cheatsheet on MITM attacks☆367Updated 5 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆42Updated 2 years ago
- All in 1 phishing framework☆38Updated 3 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13Updated 3 years ago
- ☆12Updated 2 months ago
- This script Crawl the website and find the urls that contains html forms.☆72Updated last year
- Репозиторий содержит список вопросов по наступальной безопасности.☆350Updated 2 weeks ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆494Updated 4 months ago
- Yet Another Wordlists Repo☆119Updated 3 years ago
- ☆120Updated 10 months ago
- ☆204Updated 9 months ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated 10 months ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆229Updated 5 months ago