n8n workflows related to bug bounty
β46Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for n8n-for-bug-bounty
Users that are interested in n8n-for-bug-bounty are comparing it to the libraries listed below
Sorting:
- β13Oct 24, 2024Updated last year
- Recon for Pentesting and BugBounty π΅οΈβ14Jan 14, 2026Updated last month
- β16Jan 23, 2026Updated last month
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets detβ¦β31Oct 23, 2025Updated 4 months ago
- my n00b notes on web_studyβ16May 29, 2025Updated 9 months ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspaceβ24Jul 19, 2023Updated 2 years ago
- Hacking and Learning consistently for 100 days straight af.β18Apr 12, 2022Updated 3 years ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.β19Sep 13, 2025Updated 5 months ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, β¦β13Jun 24, 2025Updated 8 months ago
- β20Jun 26, 2024Updated last year
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, proviβ¦β22Jun 12, 2023Updated 2 years ago
- Android App Reverse Engineering & Analysis Toolkitβ17Jul 10, 2024Updated last year
- Automated Recon Tool Installerβ16Jun 29, 2022Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.β29Jun 13, 2025Updated 8 months ago
- JS Finding can be used to extract JavaScript (JS) files from either a single domain URL or a list of domains. The tool supports various eβ¦β48Apr 29, 2024Updated last year
- Bash script to automate Bug Bounty Reconnaissanceβ45Jan 3, 2021Updated 5 years ago
- β23Mar 3, 2020Updated 6 years ago
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)β30May 30, 2024Updated last year
- A lightweight Python-based tool to extract and enumerate Android components and automatically generate practical ADB commandsβ107Jun 14, 2025Updated 8 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioβ¦β220Sep 25, 2025Updated 5 months ago
- all manner of wordlistsβ24Jan 19, 2022Updated 4 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secuβ¦β26Mar 6, 2023Updated 3 years ago
- AI ηζβ46Jul 30, 2025Updated 7 months ago
- Web CTF CheatSheet πβ29Jul 24, 2021Updated 4 years ago
- Itβs an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs mβ¦β80Nov 20, 2025Updated 3 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burpβ¦β28Jul 21, 2024Updated last year
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration β¦β10Nov 17, 2025Updated 3 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.β25Apr 19, 2023Updated 2 years ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized coβ¦β91Jun 17, 2025Updated 8 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-β¦β84Dec 3, 2025Updated 3 months ago
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I β¦β32Jul 13, 2023Updated 2 years ago
- Some Tutorials and Things to Help Bug Hunterβ31Mar 17, 2021Updated 4 years ago
- My Notes on Regular Expressions for AWAE/OSWE.β37Sep 5, 2023Updated 2 years ago
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulatiβ¦β82Dec 29, 2025Updated 2 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack teβ¦β99Dec 23, 2025Updated 2 months ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & traβ¦β23Jan 3, 2026Updated 2 months ago
- β16Updated this week
- Automation of some MAPT activities and interaction with the mobile Android device.β22Sep 28, 2025Updated 5 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesmentβ15Apr 27, 2024Updated last year