bot8080 / awesomeBugbounty
☆48Updated 3 years ago
Related projects: ⓘ
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆48Updated 2 years ago
- Write-ups of All types Bugs☆18Updated 2 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆48Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- XSS Finder Via SSTI☆54Updated last year
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Updated 3 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆61Updated 2 years ago
- ☆13Updated this week
- ☆21Updated 3 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆38Updated last year
- ☆19Updated 3 years ago
- Script for Bug Bounty☆28Updated 3 years ago
- ☆43Updated 3 years ago
- ☆63Updated this week
- A repository to host the subdomain wordlists from my blog https://medium.com/@nynan/what-i-learnt-from-reading-217-subdomain-takeover-bug…☆39Updated last year
- I collected it to help the bug hunter get a reward☆55Updated 2 years ago
- OSCP☆37Updated 2 years ago
- Check if domain has bug bounty program or not☆28Updated last year
- ☆32Updated last year
- Template used for my OSCP exam.☆26Updated 2 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆69Updated last year
- ☆37Updated 3 years ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆76Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Tool to automate recon☆40Updated 2 years ago
- ☆16Updated 3 years ago
- My bug bounty notes☆29Updated 3 years ago
- ☆45Updated 7 years ago