charisma334 / how-to-pwn-xyz
Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles
☆17Updated last month
Related projects ⓘ
Alternatives and complementary repositories for how-to-pwn-xyz
- Contains nuclei templates for security testing and POCs.☆16Updated 3 weeks ago
- This Tool To Test Machine Keys In View State☆55Updated last month
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆28Updated last month
- ☆93Updated last year
- My custom created nuclei for SQLi, bugbounty, pentesting☆20Updated last month
- ☆51Updated last month
- my nuclei templates☆39Updated 6 months ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆29Updated 3 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆16Updated last year
- ♥☆53Updated last month
- Power of .bashrc and .bash_aliases☆32Updated 2 years ago
- Tool for collect subdomains from different websites but the unique in tool collect subdomains from subdomainfinder.c99 and collect all su…☆26Updated last year
- A simple bash script to gather js files from waybackurls and check for any exposures using nuclei engine.☆0Updated 8 months ago
- get all nuclei temp from emad shanab repo in one run☆33Updated last year
- Some files for bruteforcing certain things.☆23Updated 3 years ago
- ☆8Updated last year
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆31Updated last year
- A Series of Tweets☆12Updated 9 months ago
- ☆29Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆10Updated 3 years ago
- Automate Recon XSS Bug Bounty☆39Updated last month
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆22Updated 11 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆13Updated 4 years ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆22Updated last year
- ☆30Updated 2 years ago
- PoC for leaking text nodes via CSS injection☆15Updated 3 months ago
- Simple tool to gather domains from crt.sh using the organization name☆97Updated 2 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆30Updated last year
- ☆118Updated 2 years ago
- ☆38Updated 3 years ago