BugSquasher Bug Bounty Tools List
☆21Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for BugSquasher
Users that are interested in BugSquasher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Do bug hunting with One-Line script and get bounty☆18Jul 30, 2023Updated 2 years ago
- ☆28Oct 3, 2024Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆153May 17, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆47Jan 14, 2024Updated 2 years ago
- ☆10Jun 19, 2024Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated 2 weeks ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- a script designed to help identify vulnerabilities and misconfigurations on a Linux system☆19Dec 31, 2022Updated 3 years ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆29Dec 12, 2023Updated 2 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆83Nov 24, 2025Updated 4 months ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- ☆27Mar 22, 2019Updated 7 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- List of Github repositories and articles with list of dorks for different search engines☆33May 15, 2022Updated 3 years ago
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆33Jul 27, 2024Updated last year
- ☆16Mar 7, 2026Updated 2 weeks ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆17Mar 3, 2023Updated 3 years ago
- xss-payload-list☆130Jul 25, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Dec 31, 2023Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- ☆25Dec 28, 2023Updated 2 years ago
- Fast Bug Bounty Script☆39Jan 15, 2025Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Jun 5, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆36Dec 8, 2023Updated 2 years ago
- ☆39Sep 28, 2019Updated 6 years ago
- A substitute repository put up on public demand for the original Awesome WAF repository (https://github.com/0xInfection/Awesome-WAF) whic…☆12May 3, 2019Updated 6 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆108Jan 26, 2026Updated 2 months ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 6 months ago
- ☆15Mar 21, 2025Updated last year