A quick bug bounty guide for beginners
☆93May 3, 2025Updated last year
Alternatives and similar repositories for BugBounty
Users that are interested in BugBounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 11 months ago
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 10 months ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- recon for bug hunters☆881Mar 5, 2026Updated 2 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated 2 months ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆430May 21, 2025Updated 11 months ago
- ☆25Jan 5, 2026Updated 4 months ago
- Penetration Testing Learning Guide☆148Jun 8, 2025Updated 10 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆19Mar 26, 2025Updated last year
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. In…☆11Sep 10, 2024Updated last year
- ☆29Nov 3, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- ☆23Sep 19, 2024Updated last year
- ☆112Feb 20, 2025Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 5 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 5 months ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Oneliners curated from my experience and from the internet☆23Feb 8, 2021Updated 5 years ago
- Collection of templates from various resources☆45Updated this week
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- ☆18Jan 8, 2025Updated last year
- Web Security Scanner☆382Nov 13, 2025Updated 5 months ago
- ☆169Dec 27, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- ☆276Dec 6, 2025Updated 5 months ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Oct 16, 2025Updated 6 months ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆235Apr 5, 2025Updated last year
- Complete Python Pandas Tutorial in Hindi (With Notes)☆11Sep 15, 2023Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆34Nov 12, 2025Updated 5 months ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- ☆22Mar 19, 2026Updated last month
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Dec 7, 2025Updated 4 months ago