alanbriangh / Magic-CheckList-for-Web-Applications
Web Security Checklist (Bug Bounty & Pentesting)
☆163Updated 2 years ago
Alternatives and similar repositories for Magic-CheckList-for-Web-Applications:
Users that are interested in Magic-CheckList-for-Web-Applications are comparing it to the libraries listed below
- mainRecon is an automated reconnaissance docker image for bugbounty hunter write in bash script.☆86Updated 2 years ago
- ☆124Updated 4 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆273Updated last year
- The project contains multiple shell scripts for automating the tasks during recon.☆173Updated last year
- Random utilities from my security projects that might be useful to others☆175Updated this week
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- My personal bug bounty toolkit.☆164Updated 7 months ago
- A script that can resolve an input file of domains and scan them with masscan☆158Updated 4 years ago
- information gathering☆274Updated 9 months ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆72Updated 4 years ago
- Simple shell script for automated domain recognition with some tools☆302Updated 4 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆164Updated 4 years ago
- Yet another subdomain finder☆201Updated 4 years ago
- ☆369Updated 3 years ago
- ☆84Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆222Updated 3 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆207Updated 4 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆235Updated 4 years ago
- Trying to make automated recon for bug bounties☆251Updated 3 years ago
- ☆420Updated 2 years ago
- All Things Bug Bounty☆112Updated 2 years ago
- Recon Methodology☆89Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆442Updated 4 years ago
- Simple recon using multiple tools!☆162Updated 3 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆68Updated 3 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆107Updated 7 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆216Updated 2 years ago
- Secret and/or credential patterns used for gf.☆236Updated last year