A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods for identifying various bugs. This guide aims to help bug hunters improve their skills in finding, verifying, and responsibly reporting security vulnerabilities.
☆129Nov 11, 2024Updated last year
Alternatives and similar repositories for BugHunterMethodology
Users that are interested in BugHunterMethodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆234Jan 20, 2026Updated 3 months ago
- Get acquisitions by scraping titles of crunchbase.☆15Dec 18, 2024Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆31May 30, 2024Updated last year
- Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own person…☆147Dec 18, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆20Sep 2, 2024Updated last year
- A Python script designed to monitor bug bounty programs for any changes and promptly notify users.☆196Apr 25, 2024Updated last year
- ☆23Jun 28, 2025Updated 9 months ago
- This repository aims to provide a comprehensive and structured approach to the reconnaissance (recon) phase of bug bounty hunting. The re…☆40Mar 22, 2025Updated last year
- ☆25Apr 8, 2026Updated last week
- ☆11Apr 29, 2023Updated 2 years ago
- 🔎 Dork Generator☆29Jun 11, 2023Updated 2 years ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 6 months ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- I will share my public tools here and strive to keep them updated in the future. Don't forget to give them a star! Your support is apprec…☆73Feb 4, 2026Updated 2 months ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆184Feb 10, 2025Updated last year
- Javascript file change monitoring☆17Mar 13, 2026Updated last month
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆23Oct 25, 2021Updated 4 years ago
- 🌐 Get Some Useful Info From Domain/IP/ASN 🔥☆19Sep 29, 2024Updated last year
- BackupFinder discovers backup files on web servers by generating intelligent patterns.☆105Jul 29, 2025Updated 8 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f …☆17Mar 14, 2025Updated last year
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆63Nov 21, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆121Dec 26, 2023Updated 2 years ago
- ☆53Oct 1, 2025Updated 6 months ago
- ☆187Mar 14, 2026Updated last month
- TLDFinder is a Python package that identifies valid top-level domains (TLDs) for a list of domains with wildcard characters in the TLD.☆24Jul 2, 2023Updated 2 years ago
- ☆37Jan 17, 2024Updated 2 years ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Aug 24, 2023Updated 2 years ago
- A passive way to find backups/ sensitive information.☆90Jul 10, 2025Updated 9 months ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆130Mar 30, 2026Updated 2 weeks ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆422May 21, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Apr 8, 2026Updated last week
- 😁 Easy Regex☆28Apr 9, 2023Updated 3 years ago
- ☆300Apr 8, 2026Updated last week
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆117Oct 18, 2024Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Extractify extension is a Chrome extension designed for web security testing, enabling users to efficiently extract JavaScript files and …☆30Dec 10, 2024Updated last year