gotr00t0day / exp0s3dLinks
Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability detection.
☆76Updated 7 months ago
Alternatives and similar repositories for exp0s3d
Users that are interested in exp0s3d are comparing it to the libraries listed below
Sorting:
- A quick bug bounty guide for beginners☆86Updated 5 months ago
- ☆130Updated 8 months ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆57Updated 4 months ago
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆164Updated last year
- ☆147Updated 8 months ago
- ☆138Updated 8 months ago
- A Bash script for automated nuclei dast scanning by using passive urls☆114Updated 7 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆65Updated last year
- ☆16Updated 6 months ago
- ☆81Updated last month
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆245Updated 10 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆201Updated last month
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆236Updated 5 months ago
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆119Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 10 months ago
- ☆145Updated last year
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆26Updated 10 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆31Updated 6 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- ☆100Updated last month
- Bug Bounty ultimate tool☆27Updated 4 months ago
- ☆25Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 4 months ago
- Automatic tool to find Google Dorks☆36Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- ☆82Updated last month
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆60Updated 2 years ago
- Automate Recon XSS Bug Bounty☆174Updated 4 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago