blackhatethicalhacking / s3-buckets-aio-pwn
An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
☆32Updated 2 weeks ago
Related projects: ⓘ
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆33Updated 2 weeks ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆20Updated 2 weeks ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆37Updated 11 months ago
- Programs I Made while learning python for pentesters.☆17Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆17Updated 2 years ago
- Script that download 37+ open source nuclei templates☆43Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Filter URLs to save your time.☆57Updated 2 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆56Updated 2 years ago
- A really fast http prober.☆38Updated 7 months ago
- ☆41Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated 11 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated last year
- Fast Bug Bounty Script☆36Updated last year
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆30Updated 3 weeks ago
- Simple bash Oneliners to make life easier☆61Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- I collected it to help the bug hunter get a reward☆55Updated 2 years ago
- Resolvers updated daily for reconftw☆46Updated last year
- ☆62Updated 4 months ago
- Speed-up your hunting with google dorks🚀🚀☆22Updated 2 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆17Updated last year
- A simple plugin to export JS files from one or multiple targets☆38Updated 10 months ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆38Updated last year
- Analysis and management tools for an Open Asset Model database☆38Updated this week
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Updated 4 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆52Updated 7 months ago
- bash script for automating subdomain enumeration process either passive or active☆26Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆21Updated 2 years ago
- ☆41Updated last year