attacker-codeninja / HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
☆10Updated 4 years ago
Alternatives and similar repositories for HowToHunt:
Users that are interested in HowToHunt are comparing it to the libraries listed below
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 4 months ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆39Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆13Updated last year
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated last year
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- A tool for generating reverse shell payloads on the fly.☆10Updated 2 years ago
- Do recon in single click☆19Updated 2 months ago
- A small and fast bash script to automate LFI vulnerability.☆11Updated 2 years ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆20Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆19Updated last year
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆12Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Fetch & Filter Known URLs☆15Updated 2 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆41Updated 8 months ago
- A simple CLI tool to check WebDAV vulnerability☆14Updated 3 years ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 5 months ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated 2 years ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 7 months ago
- Automate bug bounty recon using bash alias☆14Updated 8 months ago
- ☆22Updated last year
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 2 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆19Updated 2 years ago