askbuddie / vulnerabilitiesLinks
List of every possible vulnerabilities in computer security.
☆67Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Bug Bounty Tools used on Twitch - Recon☆304Updated 10 months ago
- Just a part of my private notes☆88Updated last year
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆215Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆347Updated 9 months ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆101Updated 3 years ago
- Automate Recon XSS Bug Bounty☆162Updated last month
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆173Updated this week
- Dorks for Bug Bounty Hunting☆176Updated last year
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆430Updated 2 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆90Updated 3 years ago
- xss-payload-list☆118Updated 11 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆184Updated last month
- BugBounty_CheatSheet☆254Updated 2 years ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆154Updated last year
- checklist for testing the web applications☆263Updated 2 years ago
- My Private Bug Hunting Methodology☆305Updated 7 months ago
- A collection of notes for bug bounty hunting☆252Updated last year
- ☆105Updated 2 years ago
- The Black Hat GraphQL Book Repository☆247Updated last year
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆165Updated 11 months ago
- Top disclosed reports from HackerOne☆155Updated 4 years ago
- ☆102Updated 2 years ago
- A collection oneliner scripts for bug bounty☆179Updated last year
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Cyber Security Notes, Methodology, Resources and Tips☆164Updated last month
- ☆206Updated last year
- These are my checklists which I use during my hunting.☆657Updated last year
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆48Updated 9 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆96Updated last year
- ☆235Updated 4 years ago