Practical Bug Bounty Hunting for Hackers and Pentesters, by EC-Council
☆23Oct 6, 2021Updated 4 years ago
Alternatives and similar repositories for Practical-Bug-Bounty-Hunting-for-Hackers-and-Pentesters
Users that are interested in Practical-Bug-Bounty-Hunting-for-Hackers-and-Pentesters are comparing it to the libraries listed below
Sorting:
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- Bug Bounty ultimate tool☆29Dec 3, 2025Updated 3 months ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- ☆31Feb 19, 2026Updated 2 weeks ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- Wall of Flippers is designed to find Flipper Zero devices using BLE (Bluetooth Low Energy)☆11Jan 16, 2026Updated last month
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- Search NVD locally☆14Jun 4, 2025Updated 9 months ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆14Mar 26, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 2 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆15Oct 19, 2023Updated 2 years ago
- scripts to use against the Nessus Professional API☆14Jan 23, 2024Updated 2 years ago
- SQL Injection – Attack and Defense Strategies, published by Packt☆16Jan 30, 2023Updated 3 years ago
- Automated Powershell Script to export NessusPro V7 or Nessus IO Scanner Reports - Nessus API☆11Dec 8, 2021Updated 4 years ago
- My Powershell notes☆15Sep 27, 2022Updated 3 years ago
- ☆18Apr 26, 2025Updated 10 months ago
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- Continuous NFC field to light LED equipped implants and tags☆22Sep 11, 2024Updated last year
- This contains scripts, tools, and other programs I show case on my youtube channel.☆22Oct 30, 2025Updated 4 months ago
- Tutorials and Things to Do while Hunting Vulnerability.☆20Sep 14, 2021Updated 4 years ago
- ☆18Sep 14, 2021Updated 4 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Aug 20, 2025Updated 6 months ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆26May 23, 2024Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 3 years ago
- Stack Based buffer overflow attack☆19Nov 25, 2023Updated 2 years ago
- Open Source Intelligence☆25Feb 25, 2017Updated 9 years ago
- A Powerful Intruder written in Python☆21Nov 18, 2021Updated 4 years ago
- Bjorn ported to the hak5 wifi pineapple pager☆72Mar 4, 2026Updated last week
- Use AI to install penetration testing tool suites in one click.☆61Oct 5, 2025Updated 5 months ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆41Aug 4, 2025Updated 7 months ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆27Sep 17, 2021Updated 4 years ago
- NSE Script for GraphQL Introspection Check☆24Jan 9, 2022Updated 4 years ago
- My CEH Practical Preparation☆24Mar 16, 2021Updated 4 years ago
- Handy Tool to check the availability of onion site and to extract the title of submitted onion links.☆25May 31, 2023Updated 2 years ago
- A tool to detect open networks, continuously scanning the environment to search for internet access and display reports on nearby Wi-Fi n…☆45Jan 23, 2026Updated last month
- A fully automated subdomain reconnaissance and sensitive data discovery toolkit.☆46Jun 29, 2025Updated 8 months ago