Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into your security journey, you'll find tools, notes, and scripts here that I've gathered and created along the way.
☆12Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for bugbounty
Users that are interested in bugbounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Recon for Pentesting and BugBounty 🕵️☆14Jan 14, 2026Updated 2 months ago
- ☆26Jan 31, 2024Updated 2 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- ☆22Feb 3, 2026Updated last month
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆63Mar 2, 2025Updated last year
- Burpsuite Extension for Jsmon☆23Feb 5, 2026Updated last month
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- A simple 👍 and efficient 💪 DataBase 📚 designed to store and use large amounts of data.☆11Jul 31, 2021Updated 4 years ago
- ☆30Mar 20, 2013Updated 13 years ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆16Mar 3, 2024Updated 2 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Grab cam shots from target's phone front camera or PC webcam just sending a link.☆26Jun 5, 2020Updated 5 years ago
- The official TrueLayer .NET library provides convenient access to TrueLayer APIs from applications built with .NET.☆15Feb 2, 2026Updated last month
- ادات جلب معلوماتUSES SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your targ…☆28Feb 3, 2021Updated 5 years ago
- Exploring fundamentals of the Web including HTML, CSS and JavaScript☆14Jul 31, 2021Updated 4 years ago
- RootMe Challenges Writeups☆12Jun 1, 2019Updated 6 years ago
- ☆12Oct 21, 2021Updated 4 years ago
- Challenges for NUS Greyhats CTF101 Web Security (2017)☆17Sep 9, 2017Updated 8 years ago
- Config files for my GitHub profile.☆12Updated this week
- ☆13Jan 31, 2025Updated last year
- Moded Magisk for perfect use on ANDRAX☆17Dec 6, 2018Updated 7 years ago
- i will upload all the books that helped me in learning in this repo☆21Jan 6, 2023Updated 3 years ago
- ☆20May 22, 2021Updated 4 years ago
- Convenient libraries to produce TrueLayer API requests signatures.☆22Mar 16, 2026Updated last week
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆36Dec 8, 2023Updated 2 years ago
- Install PowerShell on Termux☆20Jan 22, 2023Updated 3 years ago
- TensorFlow Neural Machine Translation Tutorial☆17Sep 18, 2019Updated 6 years ago
- Omise .NET Library☆21Mar 10, 2026Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆33Apr 9, 2022Updated 3 years ago
- Integrated keylogger with telegram☆18Oct 29, 2024Updated last year
- ☆15Mar 21, 2025Updated last year
- This is a small tool which allows for easy accessability to spoofing your MAC Address and scanning IP addresses. The idea behind this is …☆30Jun 20, 2019Updated 6 years ago
- ReconXplorer is an all-in-one tool for OSINT, Discord automation, and server management. It offers IP and email info, Discord token tools…☆40Jan 9, 2026Updated 2 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year