A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods for identifying various bugs. This guide aims to help bug hunters improve their skills in finding, verifying, and responsibly reporting security vulnerabilities.
☆127Nov 11, 2024Updated last year
Alternatives and similar repositories for BugHunterMethodology
Users that are interested in BugHunterMethodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆233Jan 20, 2026Updated 2 months ago
- Get acquisitions by scraping titles of crunchbase.☆15Dec 18, 2024Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆30May 30, 2024Updated last year
- Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own person…☆143Dec 18, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆20Sep 2, 2024Updated last year
- A Python script designed to monitor bug bounty programs for any changes and promptly notify users.☆196Apr 25, 2024Updated last year
- ☆23Jun 28, 2025Updated 9 months ago
- This repository aims to provide a comprehensive and structured approach to the reconnaissance (recon) phase of bug bounty hunting. The re…☆40Mar 22, 2025Updated last year
- ☆25Sep 17, 2025Updated 6 months ago
- ☆11Apr 29, 2023Updated 2 years ago
- 🔎 Dork Generator☆29Jun 11, 2023Updated 2 years ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 5 months ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- I will share my public tools here and strive to keep them updated in the future. Don't forget to give them a star! Your support is apprec…☆73Feb 4, 2026Updated last month
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆183Feb 10, 2025Updated last year
- Javascript file change monitoring☆17Mar 13, 2026Updated 2 weeks ago
- 🌐 Get Some Useful Info From Domain/IP/ASN 🔥☆19Sep 29, 2024Updated last year
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- BackupFinder discovers backup files on web servers by generating intelligent patterns.☆105Jul 29, 2025Updated 8 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆63Nov 21, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆121Dec 26, 2023Updated 2 years ago
- ☆52Oct 1, 2025Updated 5 months ago
- ☆185Mar 14, 2026Updated 2 weeks ago
- TLDFinder is a Python package that identifies valid top-level domains (TLDs) for a list of domains with wildcard characters in the TLD.☆24Jul 2, 2023Updated 2 years ago
- ☆37Jan 17, 2024Updated 2 years ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Aug 24, 2023Updated 2 years ago
- ☆249Updated this week
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆405May 21, 2025Updated 10 months ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆130Aug 10, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A passive way to find backups/ sensitive information.☆89Jul 10, 2025Updated 8 months ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Mar 9, 2026Updated 3 weeks ago
- 😁 Easy Regex☆28Apr 9, 2023Updated 2 years ago
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Extractify extension is a Chrome extension designed for web security testing, enabling users to efficiently extract JavaScript files and …☆30Dec 10, 2024Updated last year