egrullon / WountyView external linksLinks
Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty processes. This tool is very important as part of the Bug Bounties techniques.
☆14Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for Wounty
Users that are interested in Wounty are comparing it to the libraries listed below
Sorting:
- ☆17May 7, 2021Updated 4 years ago
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- This repository is a collection of write-ups that I read every day.☆13Jan 4, 2026Updated last month
- A simple vulnerable webapp created by PHP☆12Apr 18, 2025Updated 9 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 2 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- Tool designed for fast crawl and extract endpoints☆16Apr 5, 2021Updated 4 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- ☆40Jul 24, 2022Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Jul 31, 2020Updated 5 years ago
- ☆17May 20, 2021Updated 4 years ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 4 months ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆72Nov 8, 2021Updated 4 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Sep 19, 2022Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- ☆48Feb 21, 2021Updated 4 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Sep 30, 2022Updated 3 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆27Dec 8, 2020Updated 5 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago