coffinxp / nuclei-templatesLinks
☆324Updated 3 weeks ago
Alternatives and similar repositories for nuclei-templates
Users that are interested in nuclei-templates are comparing it to the libraries listed below
Sorting:
- ☆364Updated last week
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆161Updated 9 months ago
- ☆108Updated 4 months ago
- ☆104Updated 8 months ago
- ☆116Updated 3 months ago
- ☆200Updated last year
- A Bash script for automated nuclei dast scanning by using passive urls☆82Updated 3 months ago
- ☆65Updated last month
- My Priv8 Nuclei Templates☆316Updated last year
- ☆113Updated 4 months ago
- ☆149Updated 5 months ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆170Updated 3 months ago
- My Private Bug Hunting Methodology☆299Updated 6 months ago
- A modern tool written in Python that automates your xss findings.☆431Updated last year
- XSS payloads for bypassing WAF. This repository is updating continuously.☆241Updated last year
- ☆113Updated 2 months ago
- Nuclei-AI-Prompts☆197Updated last week
- Automated Tool for Testing Header Based Blind SQL Injection☆280Updated last year
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆125Updated 3 months ago
- 10,000 H1 Disclosed Reports☆109Updated last year
- Automate Recon XSS Bug Bounty☆160Updated last month
- ♥☆124Updated 8 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆143Updated 9 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆271Updated last week
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆98Updated 8 months ago
- i will upload more templates here to share with the comunity.☆545Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆246Updated 2 months ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆205Updated 10 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆136Updated 2 weeks ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆127Updated 2 weeks ago