emptymahbob / sipgLinks
Collect ips from shodan using shodan apikey.
☆14Updated 4 months ago
Alternatives and similar repositories for sipg
Users that are interested in sipg are comparing it to the libraries listed below
Sorting:
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆36Updated 3 months ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆33Updated 2 years ago
- ☆20Updated 2 months ago
- Python package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)☆12Updated 7 months ago
- A tool to slice URLs into directory levels☆17Updated 4 months ago
- A tool to generate wordlists based on case☆28Updated last year
- ☆118Updated 2 months ago
- A collection of notes for bug bounty hunting☆271Updated 2 years ago
- Reflector: A tool to check for reflected query parameter values.☆12Updated 2 years ago
- ☆22Updated 7 months ago
- ♥☆161Updated 2 months ago
- Open Redirect Payloads☆31Updated 4 years ago
- Contains nuclei templates for security testing and POCs.☆17Updated last year
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Updated last year
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Updated last year
- Subbdom API Client☆12Updated 9 months ago
- ☆30Updated 4 years ago
- ☆32Updated 7 months ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆22Updated 11 months ago
- ☆218Updated last month
- ☆35Updated this week
- My Priv8 Nuclei Templates☆330Updated last year
- ☆126Updated 3 months ago
- Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.☆16Updated last month
- Comprehensive Crawling☆19Updated 2 years ago
- Fast web fuzzer written in Go☆53Updated 2 years ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆108Updated last year
- Self-hosted bug bounty programs that are "scammy" or unethical☆148Updated 3 weeks ago
- A tool to find domains that are in the same Microsoft tenant☆21Updated 8 months ago
- Active monitoring bug bounty programs tool☆43Updated last week