codingo / bbr
An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
☆206Updated 3 years ago
Related projects: ⓘ
- Burp Extension for easily creating Wordlists☆208Updated 2 years ago
- Secret and/or credential patterns used for gf.☆229Updated last year
- A script that can resolve an input file of domains and scan them with masscan☆155Updated 4 years ago
- Python library and CLI for the Bug Bounty Recon API☆220Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆175Updated 3 years ago
- Turbo Intruder Scripts☆214Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆287Updated last year
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆267Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆313Updated last year
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆198Updated last year
- You can read the writeup on this script here☆192Updated 2 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆213Updated 2 years ago
- information gathering☆266Updated 5 months ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆204Updated 2 months ago
- ☆365Updated 3 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆147Updated last year
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆233Updated 4 years ago
- Reconnaissance tool which scans javascript files for subdomains and then iterates over all javascript files hosted on subsequent subdomai…☆221Updated 4 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆228Updated 2 years ago
- ☆202Updated 3 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆204Updated 4 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆362Updated 2 years ago
- ☆157Updated this week
- ☆121Updated 4 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆167Updated 2 years ago
- Scripts to help with different ffuf tasks and workflows☆211Updated 8 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆608Updated 5 months ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆295Updated last year
- A DNS Bruteforcing Wordlist Generator☆346Updated last year
- Unofficial documentation for the great tool Param Miner☆169Updated 2 years ago