Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty processes. This tool is very important as part of the Bug Bounties techniques.
☆14Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for Wounty
Users that are interested in Wounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆15Aug 4, 2025Updated 9 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- ☆17May 7, 2021Updated 5 years ago
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 5 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated last year
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- A Python-based automation tool for interacting with the Burp Suite API to run scans and retrieve vulnerability data programmatically.☆10Oct 3, 2022Updated 3 years ago
- This repository is a collection of write-ups that I read every day.☆13Jan 4, 2026Updated 4 months ago
- ☆41Jul 24, 2022Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- ☆32Jun 27, 2022Updated 3 years ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scanner for Cross-Site WebSocket Hijacking☆40Feb 19, 2026Updated 3 months ago
- Tool designed for fast crawl and extract endpoints☆16Apr 5, 2021Updated 5 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 6 years ago
- ☆44Nov 5, 2025Updated 6 months ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆20May 29, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- ☆18May 20, 2021Updated 5 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 7 months ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆48Feb 21, 2021Updated 5 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- all domains and his subdoamins☆64Sep 28, 2020Updated 5 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆39Oct 6, 2021Updated 4 years ago
- ☆32Oct 15, 2020Updated 5 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago