coffinxp / nuclei-templates
☆295Updated last month
Alternatives and similar repositories for nuclei-templates:
Users that are interested in nuclei-templates are comparing it to the libraries listed below
- ☆345Updated 2 months ago
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆162Updated 8 months ago
- ☆115Updated 2 months ago
- ☆105Updated 3 months ago
- ☆145Updated 4 months ago
- ☆96Updated 7 months ago
- ☆110Updated 3 months ago
- ☆64Updated 3 weeks ago
- A Bash script for automated nuclei dast scanning by using passive urls☆74Updated 2 months ago
- My Priv8 Nuclei Templates☆316Updated 11 months ago
- ☆194Updated last year
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆169Updated 2 months ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆123Updated 2 months ago
- 10,000 H1 Disclosed Reports☆109Updated 11 months ago
- ☆109Updated last month
- My Private Bug Hunting Methodology☆294Updated 5 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆104Updated last week
- XSS payloads for bypassing WAF. This repository is updating continuously.☆239Updated last year
- Nuclei-AI-Prompts☆190Updated last month
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆113Updated 3 months ago
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆98Updated 7 months ago
- ☆41Updated last month
- A modern tool written in Python that automates your xss findings.☆428Updated last year
- ♥☆112Updated 7 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆135Updated 8 months ago
- Automate Recon XSS Bug Bounty☆156Updated last month
- ☆128Updated last month
- Automated Tool for Testing Header Based Blind SQL Injection☆276Updated last year
- Active monitoring bug bounty programs tool☆21Updated 2 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆329Updated 7 months ago