coffinxp / payloadsLinks
☆364Updated this week
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- ☆324Updated 3 weeks ago
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆161Updated 9 months ago
- ☆65Updated last month
- ☆108Updated 4 months ago
- ☆116Updated 3 months ago
- A Bash script for automated nuclei dast scanning by using passive urls☆82Updated 2 months ago
- ☆113Updated 4 months ago
- ☆198Updated last year
- ☆102Updated 8 months ago
- ☆149Updated 5 months ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆170Updated 3 months ago
- My Private Bug Hunting Methodology☆299Updated 6 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆127Updated 2 weeks ago
- A modern tool written in Python that automates your xss findings.☆431Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆121Updated this week
- My Priv8 Nuclei Templates☆316Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆136Updated 2 weeks ago
- Nuclei-AI-Prompts☆197Updated last week
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,179Updated last month
- XSS payloads for bypassing WAF. This repository is updating continuously.☆240Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆334Updated 8 months ago
- Automate Recon XSS Bug Bounty☆160Updated 3 weeks ago
- ♥☆124Updated 8 months ago
- Here you can find mostly all disclosed h1 reports☆25Updated 3 years ago
- 10,000 H1 Disclosed Reports☆109Updated last year
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆141Updated 9 months ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆209Updated last year
- ☆42Updated 2 months ago
- ☆113Updated 2 months ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆125Updated 3 months ago