☆25Dec 28, 2023Updated 2 years ago
Alternatives and similar repositories for Bug-Bounty-Roadmaps-Collection
Users that are interested in Bug-Bounty-Roadmaps-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Apr 13, 2023Updated 3 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆32Feb 17, 2023Updated 3 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- ☆46Sep 20, 2024Updated last year
- A curated list of awesome OSCP resources☆18Apr 15, 2020Updated 6 years ago
- ☆29May 22, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆22Mar 24, 2020Updated 6 years ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- tools to find xss in a website☆62Apr 27, 2022Updated 3 years ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆26Jan 23, 2024Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- TCP及UDP的发包程序☆10Mar 18, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Jul 8, 2024Updated last year
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- ☆139Nov 9, 2024Updated last year
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆18Jan 23, 2025Updated last year
- XSS-Checker is a tool used to Check / Validate for XSS vulnerabilities☆18Dec 1, 2022Updated 3 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last month
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago