bhavesh-pardhi / One-LinerView external linksLinks
Do bug hunting with One-Line script and get bounty
☆18Jul 30, 2023Updated 2 years ago
Alternatives and similar repositories for One-Liner
Users that are interested in One-Liner are comparing it to the libraries listed below
Sorting:
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- BugSquasher Bug Bounty Tools List☆20Feb 2, 2023Updated 3 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated last year
- Advanced object tracking system in Turkey Live CCTV footages.☆28Feb 24, 2024Updated last year
- Cloudflare Bypass Script☆23Dec 12, 2019Updated 6 years ago
- Check if domain has bug bounty program or not☆28Jul 28, 2023Updated 2 years ago
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆29Dec 12, 2023Updated 2 years ago
- ☆27Mar 22, 2019Updated 6 years ago
- ☆15Mar 21, 2025Updated 10 months ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆10Jul 16, 2024Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆152May 17, 2024Updated last year
- Bug-hunting Automation☆40Jun 11, 2023Updated 2 years ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Jul 5, 2023Updated 2 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Hack facebook using this python script - Kali Linux☆14Jun 14, 2021Updated 4 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- Cheat sheet☆36Dec 16, 2019Updated 6 years ago
- Permissionless pooling of NFT's into an ERC20.☆14Dec 22, 2022Updated 3 years ago
- DDos attack☆10Feb 13, 2023Updated 3 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated last month
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 5 months ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆10May 14, 2023Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆13Aug 23, 2024Updated last year
- I DOC VIEW RCE 的poc☆13Nov 23, 2023Updated 2 years ago
- Simple web API in php which takes as a parameter with GET requests to launch attacks with scripts present on the machine. There is also …☆11Mar 27, 2021Updated 4 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- A undetected Twitter bot using Selenium & Python☆10Aug 5, 2021Updated 4 years ago