bugcrowd / HUNT
☆2,243Updated last year
Alternatives and similar repositories for HUNT:
Users that are interested in HUNT are comparing it to the libraries listed below
- This tool can be used to brute discover GET and POST parameters☆1,361Updated 5 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆1,949Updated 3 years ago
- A curated list of amazingly awesome Burp Extensions☆3,082Updated 2 weeks ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,384Updated last month
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,763Updated 2 years ago
- A script to set up a quick Ubuntu 17.10 x64 box with tools I use.☆1,184Updated 8 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,710Updated 10 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,386Updated 4 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,511Updated 2 years ago
- Subdomain Takeover tool written in Go☆1,947Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,089Updated this week
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,241Updated 4 years ago
- Notes about attacking Jenkins servers☆2,032Updated 7 months ago
- A Powerful Subdomain Takeover Tool☆938Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,906Updated last year
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,233Updated 10 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,144Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,218Updated last year
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,178Updated 3 weeks ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆2,955Updated 8 months ago
- Discover Your Attack Surface!☆1,374Updated 2 years ago
- XSS payloads designed to turn alert(1) into P1☆1,350Updated last year
- BBT - Bug Bounty Tools (examples💡)☆1,745Updated 10 months ago
- A python script that finds endpoints in JavaScript files☆3,841Updated 10 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,747Updated 3 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,877Updated 10 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆1,332Updated 2 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆997Updated 4 years ago
- Setup script for Regon-ng☆925Updated 4 years ago
- A collection of tools to perform searches on GitHub.☆1,387Updated 2 years ago