bug bounty
☆11Aug 13, 2023Updated 2 years ago
Alternatives and similar repositories for bug-bounty
Users that are interested in bug-bounty are comparing it to the libraries listed below
Sorting:
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last week
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Jul 24, 2022Updated 3 years ago
- Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.☆26May 26, 2022Updated 3 years ago
- a shared short domain for XSS and other hacks☆32Mar 3, 2022Updated 4 years ago
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- ☆31Aug 25, 2023Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A vulnerable application exposing Spring Boot Actuators☆123Feb 25, 2019Updated 7 years ago
- My CTF challenges (2018~)☆28Sep 17, 2023Updated 2 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- A little bit of help.☆13Jul 25, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 21, 2026Updated last week
- ☆14May 14, 2022Updated 3 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- Info & resources for CSC 325 Computer Architecture at TCNJ☆11Oct 1, 2020Updated 5 years ago
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- ☆13Jul 24, 2023Updated 2 years ago
- Android library for recognizing java classes and methods based on their signatures☆10Mar 18, 2020Updated 5 years ago
- Webcam phishing and IP logger connect with Discord webhook.☆13Nov 13, 2021Updated 4 years ago
- study the kernel data structures and its API☆13May 10, 2022Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago