Files and Folders list used in file enumeration during Bug Bounty
☆12Oct 16, 2020Updated 5 years ago
Alternatives and similar repositories for master_discovery
Users that are interested in master_discovery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- Final and fully functional Car pooling app with database hosted on hostinger.in☆12Dec 7, 2017Updated 8 years ago
- ☆13Mar 7, 2025Updated last year
- ☆105Mar 18, 2026Updated last month
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Online Auction is a online platform for auction and this project is made using PHP 5, MySQL, Javascript, JQuery, Bootstrap and HTML☆16Sep 25, 2016Updated 9 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- ☆31Sep 9, 2025Updated 7 months ago
- ☆23Mar 29, 2022Updated 4 years ago
- An Android carpooling app☆15Mar 13, 2019Updated 7 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- School Simplified is a digital nonprofit whose mission is to spread educational equality by providing free academic services, products, a…☆21Mar 10, 2022Updated 4 years ago
- This is very basic automated recon script tool.☆18Jul 14, 2024Updated last year
- ☆20Aug 15, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of scripts used to interact with the Burp Rest API☆56Feb 11, 2019Updated 7 years ago
- Use this Python Bot that Automates like4like.org to Gain Free Credit.☆16Apr 4, 2023Updated 3 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- List of Mine Private wordlist i use for fuzzing☆92Feb 25, 2026Updated 2 months ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Aug 18, 2020Updated 5 years ago
- ☆65Sep 8, 2025Updated 7 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆149Apr 14, 2026Updated 2 weeks ago
- ☆12Feb 23, 2015Updated 11 years ago
- Automation for Open Threat Exchange☆24Mar 16, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 4 months ago
- Another Subdomain ENumeration Tool☆14Oct 15, 2022Updated 3 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- A basic golang server/client for distributing tasks over multiple systems.☆39Jul 20, 2020Updated 5 years ago
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Dec 30, 2024Updated last year
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- ☆32Jan 28, 2020Updated 6 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- my-nuclei-templates☆12Dec 9, 2021Updated 4 years ago
- introduction to distributed scanning using vultr☆11Apr 29, 2017Updated 9 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆29Feb 24, 2023Updated 3 years ago