dwisiswant0 / osscope
A curated GitHub repository that's in-scope and eligible for bounty.
☆20Updated 2 years ago
Alternatives and similar repositories for osscope:
Users that are interested in osscope are comparing it to the libraries listed below
- Query various sources for CVE proof-of-concepts☆51Updated last year
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- ☆35Updated 2 months ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆22Updated 2 years ago
- all manner of wordlists☆25Updated 3 years ago
- Custom scripts for directory fuzzing, subdomain enumeration, and more.☆43Updated 3 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆17Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago
- My Custom made Nuceli-Templates☆23Updated last year
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆12Updated 9 months ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆33Updated 4 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆37Updated 5 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Updated 4 years ago
- an Evil Java RMI Registry.☆49Updated 2 years ago
- ☆36Updated 4 years ago
- Collection of tools to interact with Intigriti website☆16Updated 7 months ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 3 years ago
- A Burp extension to show the Collaborator client in a tab☆23Updated 2 years ago
- Subdomain enumeration statistics and wordlists from bugbounty scopes.☆33Updated 3 years ago
- Saves pages to Wayback machine☆13Updated 4 months ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆28Updated 3 years ago
- Default plugins for Jaeles Scanner☆33Updated 4 years ago
- Creating a Database for Mass Recon☆12Updated 4 years ago