alanbriangh / Magic-CheckList-for-Web-Applications
Web Security Checklist (Bug Bounty & Pentesting)
☆163Updated 2 years ago
Alternatives and similar repositories for Magic-CheckList-for-Web-Applications:
Users that are interested in Magic-CheckList-for-Web-Applications are comparing it to the libraries listed below
- mainRecon is an automated reconnaissance docker image for bugbounty hunter write in bash script.☆88Updated 2 years ago
- ☆124Updated 4 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated last year
- The project contains multiple shell scripts for automating the tasks during recon.☆176Updated last year
- Secret and/or credential patterns used for gf.☆238Updated 2 years ago
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- Yet another subdomain finder☆202Updated 5 years ago
- All Things Bug Bounty☆113Updated 2 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆165Updated 4 years ago
- The tools I have programmed to help me with bugbounty's☆114Updated 5 years ago
- Random utilities from my security projects that might be useful to others☆178Updated 3 weeks ago
- ☆370Updated 3 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆72Updated 4 years ago
- My personal bug bounty toolkit.☆164Updated 8 months ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆168Updated 4 years ago
- API Pentesting notes.☆96Updated 3 months ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆145Updated 4 years ago
- information gathering☆273Updated 10 months ago
- ☆52Updated last year
- ☆423Updated 2 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆413Updated 4 years ago
- Tools and datas related to Bug Bounty.☆231Updated 2 years ago
- Recon Methodology☆90Updated 3 years ago
- Trying to make automated recon for bug bounties☆252Updated 3 years ago
- ☆358Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆223Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆443Updated 4 years ago
- Reestructured LemonBooster.☆47Updated 6 months ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆209Updated 4 years ago