askbuddie / vulnerabilitiesLinks
List of every possible vulnerabilities in computer security.
☆67Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Quick research done on some bug bounty blogs! Check em out :)☆135Updated 5 months ago
- xss-payload-list☆118Updated 11 months ago
- Just a part of my private notes☆85Updated last year
- ☆102Updated 2 years ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆211Updated last year
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆153Updated last year
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆158Updated 10 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆148Updated last week
- Automate Recon XSS Bug Bounty☆161Updated last week
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆98Updated 3 years ago
- ☆20Updated 7 months ago
- My Notes & Resources Of Bug Bounty Checklists☆68Updated 5 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆95Updated last year
- Dorks for Bug Bounty Hunting☆175Updated 11 months ago
- ☆105Updated 2 years ago
- A resources for who want to learn and get deep into client-side bugs☆155Updated 6 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- Web Application Penetration Testing☆116Updated last month
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- My Private Bug Hunting Methodology☆302Updated 7 months ago
- ☆87Updated 6 years ago
- ☆41Updated last year
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆102Updated 8 months ago
- My small collection of reports templates☆81Updated 5 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆133Updated last month
- A collection of notes for bug bounty hunting☆247Updated last year
- A collection of notes, checklists, writeups on bug bounty hunting and web application security.☆147Updated 2 years ago
- ☆149Updated 6 months ago
- ☆165Updated 8 months ago
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.☆166Updated 3 months ago