domssilva / vulnsearchLinks
A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from books, videos, articles and own experience with bug bounty hunting / web and network hacking
☆109Updated 3 years ago
Alternatives and similar repositories for vulnsearch
Users that are interested in vulnsearch are comparing it to the libraries listed below
Sorting:
- A combined wordlists for files and directory discovery☆127Updated 4 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆92Updated last year
- ☆72Updated 5 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆174Updated 4 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆107Updated 5 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆174Updated 2 years ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆150Updated 2 years ago
- Auto deployment of my VPS☆100Updated 4 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆104Updated 6 years ago
- FockCache - Minimalized Test Cache Poisoning☆111Updated 5 years ago
- XSS Payload without Anything.☆104Updated 6 years ago
- ☆105Updated 5 years ago
- ☆58Updated 2 years ago
- Resources I consider useful for security research of web applications☆61Updated 5 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74Updated 4 years ago
- Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities☆150Updated 3 years ago
- Shodan subdomain finder☆67Updated 5 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- Web Application recon automation☆125Updated 5 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆71Updated last year
- A XSS mind map ;)☆57Updated 10 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 3 years ago
- ASN reconnaissance script☆131Updated 2 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 7 months ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- Pentesting/Bugbounty Dockerfiles.☆176Updated 4 years ago
- ☆39Updated 6 years ago
- Misc bounty and vulndisc things☆85Updated 5 years ago
- CRLF and open redirect fuzzer☆111Updated 4 years ago
- Payloads to be used with Burp Suite Intruder. (Originally found on swisskeyrepo-PayloadsAllTheThings)☆86Updated 5 years ago