gerosecurity / gerobugLinks
The First Open Source Bug Bounty Platform
☆93Updated last month
Alternatives and similar repositories for gerobug
Users that are interested in gerobug are comparing it to the libraries listed below
Sorting:
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆114Updated last year
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆137Updated 6 months ago
- Cyber Security Awareness Framework (CSAF)☆101Updated 9 months ago
- ☆73Updated 3 years ago
- Resources for Mobile Application Testing 📓☆70Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆152Updated 2 months ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆26Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆171Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆50Updated 2 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆149Updated 8 months ago
- Security Advisories☆35Updated last month
- Google maps api key checker for pentesting purpose☆28Updated 3 years ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆61Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆291Updated 3 months ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆54Updated 3 years ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆119Updated this week
- Advanced APK analysis tool with intelligent caching, pattern matching, and comprehensive security vulnerability detection☆78Updated 2 months ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆111Updated 9 months ago
- ☠️ Code for the Defcon Workshop☆23Updated last year
- Examples of different vulnerabilities, in a variety of languages, shapes and sizes.☆29Updated last year
- A platform to develop, run and administer CTF competitions. This is the online echoCTF.RED platform source code☆144Updated last week
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆115Updated 2 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆33Updated 3 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆112Updated 6 months ago
- Information Security Information From Web☆28Updated 4 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last month
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year