charisma334 / how-to-pwn-xyzLinks
Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles
☆17Updated 8 months ago
Alternatives and similar repositories for how-to-pwn-xyz
Users that are interested in how-to-pwn-xyz are comparing it to the libraries listed below
Sorting:
- Contains nuclei templates for security testing and POCs.☆17Updated 7 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 8 months ago
- output burp body only and auto pretiffy☆15Updated last month
- my nuclei templates☆40Updated last year
- ☆16Updated 4 months ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆36Updated 3 years ago
- ☆71Updated 8 months ago
- My custom created nuclei for SQLi, bugbounty, pentesting☆25Updated 3 weeks ago
- ☆21Updated last year
- ☆95Updated 2 years ago
- ☆17Updated last year
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆35Updated 2 years ago
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆19Updated 6 months ago
- A Series of Tweets☆16Updated last year
- ☆26Updated 11 months ago
- ♥☆124Updated 8 months ago
- ☆11Updated 8 months ago
- A tool to slice URLs into directory levels☆14Updated 3 weeks ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆10Updated 3 years ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆32Updated 2 years ago
- ☆33Updated 2 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆30Updated last year
- All About XSS☆14Updated 2 years ago
- Some files for bruteforcing certain things.☆24Updated 3 years ago
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆45Updated 4 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Updated 10 months ago
- ☆43Updated 5 months ago
- ☆20Updated last year
- ☆32Updated 6 months ago