Collection of HTTP scanners and fuzzers.
☆11Jan 23, 2025Updated last year
Alternatives and similar repositories for bug-bounty-tools
Users that are interested in bug-bounty-tools are comparing it to the libraries listed below
Sorting:
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 3 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- ☆25Dec 4, 2019Updated 6 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- ☆10Jul 21, 2021Updated 4 years ago
- Android-MediaStreamingServer was written in kotlin using NanoHTTPD library. This Server can support video streaming with full range(seek)…☆12Nov 27, 2020Updated 5 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- An android application which exploits sieve through android components.☆44Sep 17, 2017Updated 8 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- A repository for commonly used helm charts with Palantir Fedstart☆17Feb 13, 2026Updated 2 weeks ago
- ☆10Jun 13, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 7 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆43Jul 13, 2023Updated 2 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Tool to automate recon☆42Dec 28, 2021Updated 4 years ago
- Keyword monitoring tool for .onion sites — threat intelligence & brand monitoring☆54Updated this week
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- ☆10May 1, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- ☆11Jul 15, 2024Updated last year