Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.
☆41Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for SniffCon-Ultimate-Recon-Dashboard-For-Bug-Bounty-And-Pentesting
Users that are interested in SniffCon-Ultimate-Recon-Dashboard-For-Bug-Bounty-And-Pentesting are comparing it to the libraries listed below
Sorting:
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- ☆21Jul 13, 2022Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Magic tricks using grep, sed and awk☆26Jul 28, 2022Updated 3 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- ☆11May 28, 2022Updated 3 years ago
- Getting started in bug bounty!☆33Jul 16, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆13Oct 26, 2017Updated 8 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆14Mar 1, 2026Updated last week
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- A blog where I write stuffs in order to understand them better.☆12Apr 25, 2025Updated 10 months ago
- Android penetration testing tool for Kali linux☆188Jul 12, 2018Updated 7 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆177Jul 8, 2022Updated 3 years ago
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆105Jun 28, 2022Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- ☆40Jul 24, 2022Updated 3 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Autofills, Information, Discord, Telegram)☆20Apr 8, 2024Updated last year
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- Burp Extender, ssrf scanner, 自动扫描ssrf漏洞☆46Mar 31, 2021Updated 4 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- ☆251May 25, 2021Updated 4 years ago
- 👺hacking is demonic👺☆21Jan 8, 2024Updated 2 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago