A quick bug bounty guide for beginners
☆92May 3, 2025Updated 11 months ago
Alternatives and similar repositories for BugBounty
Users that are interested in BugBounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 10 months ago
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- recon for bug hunters☆879Mar 5, 2026Updated last month
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated 2 months ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Bug Bounty ultimate tool☆28Dec 3, 2025Updated 4 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆417May 21, 2025Updated 10 months ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- Penetration Testing Learning Guide☆143Jun 8, 2025Updated 10 months ago
- ☆25Jan 5, 2026Updated 3 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆19Mar 26, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆29Nov 3, 2024Updated last year
- Webanator: Webcam scraper written in python that will scrape any countries web cameras.☆26Jan 10, 2026Updated 3 months ago
- ☆23Sep 19, 2024Updated last year
- ☆112Feb 20, 2025Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 5 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- Oneliners curated from my experience and from the internet☆23Feb 8, 2021Updated 5 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Jam CCTV Camera using DOS attack☆39May 27, 2024Updated last year
- Collection of templates from various resources☆44Dec 5, 2025Updated 4 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Detect whether a site is running behind Cloudflare.☆24Jun 16, 2024Updated last year
- Web Security Scanner☆382Nov 13, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆169Dec 27, 2024Updated last year
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 5 years ago
- ☆275Dec 6, 2025Updated 4 months ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆54Mar 29, 2025Updated last year
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆233Apr 5, 2025Updated last year