a-chernobrov / for_newby_in_bug_bountyLinks
Репозиторий с материалами для развития в Bug Bounty
☆11Updated 2 years ago
Alternatives and similar repositories for for_newby_in_bug_bounty
Users that are interested in for_newby_in_bug_bounty are comparing it to the libraries listed below
Sorting:
- Check bitrix vulnerabilities☆88Updated last year
- Google IP Search Engine☆166Updated 3 years ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- ☆136Updated 4 years ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.☆57Updated 9 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆39Updated last year
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆125Updated last year
- Some nuclei templates for pentest CMS Bitrix☆37Updated last month
- A monster cheatsheet on MITM attacks☆367Updated 7 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆178Updated last month
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆218Updated 9 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆401Updated 3 weeks ago
- All in 1 phishing framework☆37Updated 3 years ago
- ☆105Updated 2 years ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆27Updated 3 weeks ago
- Hackings style defence tricks☆56Updated last week
- Bitrix vulnerability scanner☆21Updated 2 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13Updated 3 years ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆231Updated 7 months ago
- This script Crawl the website and find the urls that contains html forms.☆73Updated last year
- ☆123Updated last year
- Репозиторий содержит список вопросов по наступальной безопасности.☆357Updated 2 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆198Updated 5 months ago
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в о бласти безопасности.☆51Updated 3 years ago
- https://t.me/+V6d8SvKVFXo2MjIy☆41Updated 2 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆334Updated 4 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆33Updated 2 years ago
- Generates a DEBUG PIN for flask applications based on Werkzeug☆17Updated 2 years ago