Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as target discovery using dorks, indexing, and URL vulnerability scanning.
☆137Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for bughunter
Users that are interested in bughunter are comparing it to the libraries listed below
Sorting:
- ☆28Apr 2, 2021Updated 4 years ago
- A lightweight OSINT tool for performing WHOIS checks, DNS lookups, email harvesting, and social media scanning.☆26Jun 6, 2025Updated 9 months ago
- Python scripts and tools built during my learning journey☆31Nov 14, 2025Updated 4 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆31Jan 27, 2026Updated last month
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆23Sep 20, 2025Updated 6 months ago
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆62Mar 8, 2026Updated last week
- Red Team Scaner☆58Nov 25, 2025Updated 3 months ago
- ☆10Apr 2, 2023Updated 2 years ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆89Oct 5, 2025Updated 5 months ago
- hostagram osint tool Instagram | hostagram 1.4☆106Mar 1, 2026Updated 2 weeks ago
- Run Ubuntu with pre-installed Desktop Environments in android/termux with ease! Everything is preinstalled so just download install and d…☆10Jul 20, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 3 weeks ago
- ☆12Aug 10, 2022Updated 3 years ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- Docker image for OpenClash☆11Dec 20, 2022Updated 3 years ago
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆82Feb 26, 2026Updated 3 weeks ago
- A Security System using the face recognition, which can be monitored from anywhere using a HTTP server, coded using Python and Jinja☆11Mar 4, 2021Updated 5 years ago
- SPK- Sistem Pengambilan Keputusan menggunakan metode SMART Simple Multi Attribute Rating Technique☆12Nov 19, 2019Updated 6 years ago
- ☆12May 10, 2024Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- 📞 First ever OTP Bot maker for beginners. Generate your own OTP source in python or nodejs with any features you like!☆10Apr 21, 2023Updated 2 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 8 months ago
- Mr. Robot's EvilCorp Terminal style for your shell☆41Jun 3, 2016Updated 9 years ago
- The OpenAI Checker is a Python script that allows users to check the billing status of their OpenAI API keys. It retrieves the remaining …☆14May 7, 2023Updated 2 years ago
- ☆11Feb 24, 2025Updated last year
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆86Feb 14, 2026Updated last month
- This repository implements a question answering system that retrieves information from uploaded PDFs using Google Generative AI and LangC…☆12Dec 25, 2023Updated 2 years ago
- Deep scan domain and find all possible domain to takeover☆17Apr 19, 2023Updated 2 years ago
- 📝 Web security related academic papers collection (just for myself).☆25Sep 9, 2021Updated 4 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- AI application that can classify medical text according to the category of the ailment being described.☆12Apr 7, 2021Updated 4 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated last month
- ☆63Dec 22, 2025Updated 2 months ago
- python based latest zombie bot v.14☆18Mar 23, 2021Updated 4 years ago
- Expired domain names by day 2018 (EDNBD) https://cirosantilli.com/cia-2010-covert-communication-websites#expired-domain-trackers☆16Mar 8, 2025Updated last year
- Detect and extract hidden files☆22Aug 29, 2024Updated last year