γπγBug Bounty Tricks
β41Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for BugBountyTricks
Users that are interested in BugBountyTricks are comparing it to the libraries listed below
Sorting:
- γπγCORS vulnerability scannerβ12Dec 7, 2024Updated last year
- γπ½γMBR Overwrite malware for linuxβ28Dec 7, 2024Updated last year
- γπ§±γTest a list of payloads and see if you can bypass itβ62Jun 4, 2022Updated 3 years ago
- γπ»γSimple kernel made in 16-bit assembly onlyβ18Dec 7, 2024Updated last year
- Subdomain Recon Toolβ13Sep 11, 2022Updated 3 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpendingβ10Nov 12, 2018Updated 7 years ago
- γπ―γSimple low-interaction honeypot with FTP, Telnet and Webβ12Dec 7, 2024Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..β10Aug 15, 2024Updated last year
- FOR BTCβ13Mar 28, 2022Updated 3 years ago
- γπ₯γCVE-2022-26134 - Confluence Pre-Auth RCEβ14Jun 19, 2022Updated 3 years ago
- Wolfy AV Bypasserβ30Feb 8, 2023Updated 3 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ25Aug 1, 2022Updated 3 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.β24Jan 26, 2022Updated 4 years ago
- Fast Subdomain Enumeration Tool made with Bash only π―β15Nov 3, 2021Updated 4 years ago
- γπͺγLinux Backdoor based on ICMP protocolβ63Dec 7, 2024Updated last year
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The cβ¦β17Mar 30, 2023Updated 2 years ago
- β16Mar 25, 2023Updated 2 years ago
- Bash script to generate reverse shell payloadsβ19Sep 9, 2023Updated 2 years ago
- γπγXSS Payload Listβ45Feb 26, 2023Updated 3 years ago
- Netcat for windows.β21Sep 23, 2018Updated 7 years ago
- Crack encrypted master Key and ckey of a bitcoin wallet(POC)β18Sep 1, 2022Updated 3 years ago
- BurpSiute - BurpBounty Profilesβ20Feb 10, 2023Updated 3 years ago
- β18Apr 7, 2022Updated 3 years ago
- π Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project suppβ¦β18Apr 18, 2023Updated 2 years ago
- β20May 25, 2025Updated 9 months ago
- Applying some AV evasion techniques on a metasploit reverse shellβ18Nov 12, 2020Updated 5 years ago
- ButKoin is an experimental decentralized secure cryptocurrency that is easy to mine devoid from 51% attack and it provide easy means of tβ¦β21Jan 22, 2023Updated 3 years ago
- Hidden input parameters finderβ19Jul 10, 2023Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228β25Dec 14, 2021Updated 4 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerabilityβ21Mar 8, 2022Updated 3 years ago
- Hacking the target computer and receiving complete information such as passwords stored in the browser, session theft, cookie theft, credβ¦β19Jul 26, 2022Updated 3 years ago
- Oneliners curated from my experience and from the internetβ23Feb 8, 2021Updated 5 years ago
- This is a simple process injection made in C for Linux systemsβ30Sep 23, 2023Updated 2 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.β27Sep 4, 2022Updated 3 years ago
- Auto IP range scanner & exploit tool for BlueKeep metasploit moduleβ24Nov 16, 2021Updated 4 years ago
- all manner of wordlistsβ24Jan 19, 2022Updated 4 years ago
- A builder for BatchStealerβ17Aug 11, 2022Updated 3 years ago
- Oracle WebLogic Server 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 Local File Inclusionβ27Jan 25, 2022Updated 4 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coinsβ31Dec 7, 2022Updated 3 years ago