Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty processes. This tool is very important as part of the Bug Bounties techniques.
☆14Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for Wounty
Users that are interested in Wounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- ☆17May 7, 2021Updated 4 years ago
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 5 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 2 years ago
- This repository is a collection of write-ups that I read every day.☆13Jan 4, 2026Updated 2 months ago
- ☆41Jul 24, 2022Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated last month
- Tool designed for fast crawl and extract endpoints☆16Apr 5, 2021Updated 4 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- ☆17May 20, 2021Updated 4 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 5 months ago
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆48Feb 21, 2021Updated 5 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- all domains and his subdoamins☆64Sep 28, 2020Updated 5 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆32Oct 15, 2020Updated 5 years ago
- ☆39Oct 6, 2021Updated 4 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago