☆33Oct 12, 2022Updated 3 years ago
Alternatives and similar repositories for bugbounty-cheatsheet
Users that are interested in bugbounty-cheatsheet are comparing it to the libraries listed below
Sorting:
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Automation: Bash script wrapper to find and verify time base sql injection☆10Aug 25, 2022Updated 3 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- ☆17Oct 15, 2024Updated last year
- A XSS mind map ;)☆57Jan 16, 2016Updated 10 years ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Feb 10, 2024Updated 2 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Jun 4, 2023Updated 2 years ago
- BugBuntu Linux☆15May 21, 2021Updated 4 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated 3 weeks ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- This Lab contain the sample codes Basic Labs related to Server-Side Request Forgery attack☆21Nov 13, 2020Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- ☆17Sep 24, 2022Updated 3 years ago
- ☆43Jun 18, 2025Updated 8 months ago
- Script that download 37+ open source nuclei templates☆45Sep 2, 2022Updated 3 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- Burp Suite extension to log GraphQL operations as a comment☆23Aug 9, 2021Updated 4 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- ☆138Jul 9, 2021Updated 4 years ago
- This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, …☆53Mar 29, 2023Updated 2 years ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- 📚 An ultimate collection wordlists of the best-known CMS☆93Jun 10, 2024Updated last year
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated last year
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- Intentionally Vulnerable to Spring4Shell☆52Apr 1, 2022Updated 3 years ago