alanbriangh / Magic-CheckList-for-Web-Applications
Web Security Checklist (Bug Bounty & Pentesting)
☆163Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Magic-CheckList-for-Web-Applications
- mainRecon is an automated reconnaissance docker image for bugbounty hunter write in bash script.☆85Updated 2 years ago
- ☆122Updated 4 years ago
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆271Updated last year
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆205Updated 4 years ago
- All Things Bug Bounty☆111Updated 2 years ago
- Simple recon using multiple tools!☆161Updated 2 years ago
- ☆367Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆175Updated 3 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆72Updated 4 years ago
- Recon Methodology☆84Updated 3 years ago
- API Pentesting notes.☆96Updated 2 weeks ago
- The tools I have programmed to help me with bugbounty's☆115Updated 5 years ago
- My personal bug bounty toolkit.☆164Updated 5 months ago
- Tools and datas related to Bug Bounty.☆231Updated 2 years ago
- RepoToStoreBugBountyInfo☆280Updated 4 years ago
- PDF slides☆246Updated 3 years ago
- ☆83Updated 3 years ago
- ☆206Updated 3 years ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆145Updated 4 years ago
- Automating XSS using Bash☆350Updated 8 months ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆234Updated 4 years ago
- A script that can resolve an input file of domains and scan them with masscan☆155Updated 4 years ago
- ☆228Updated 3 years ago
- Simple shell script for automated domain recognition with some tools☆300Updated 4 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆67Updated 3 years ago
- ☆418Updated last year
- This is one of the largest checklist available so far on the Internet.☆232Updated 3 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆169Updated 3 years ago