An Bug Hunters tool to find many Vulnerabilities using Google dorks
☆19Nov 18, 2020Updated 5 years ago
Alternatives and similar repositories for bugdork
Users that are interested in bugdork are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- RootersCTF 2019 challenges☆18Oct 12, 2019Updated 6 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Practice material for my subscribers.☆24Oct 19, 2024Updated last year
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Automatic SQL injector web-forum based CMS☆15Jan 2, 2022Updated 4 years ago
- WordPress WP_Query SQL Injection POC☆28Mar 11, 2023Updated 3 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- Google dork generator with php☆19Nov 18, 2022Updated 3 years ago
- Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)☆25Aug 9, 2022Updated 3 years ago
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆44Jun 9, 2023Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆40Oct 2, 2023Updated 2 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 weeks ago
- A list of web application security☆15Dec 26, 2019Updated 6 years ago
- My small collection of reports templates☆87Oct 22, 2019Updated 6 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- Prompts, resources, demos, and everything☆23Dec 10, 2022Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆91Jan 14, 2022Updated 4 years ago
- Google dorks for OSINT☆28Feb 5, 2020Updated 6 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆26Apr 13, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆83Nov 24, 2025Updated 4 months ago
- A collection of awesome software, libraries, Learning Tutorials, documents, books, resources and interesting stuff about APIs☆19Jul 4, 2022Updated 3 years ago
- Example of how you can create your own dojo☆12Sep 2, 2025Updated 6 months ago
- ☆15Jan 4, 2021Updated 5 years ago
- A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks☆60Aug 30, 2019Updated 6 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Learn AWS Security by Example☆22Apr 20, 2022Updated 3 years ago
- ☆10Feb 28, 2023Updated 3 years ago