h4x0r-dz / Leaked-Credentials
how to look for Leaked Credentials !
☆898Updated 10 months ago
Alternatives and similar repositories for Leaked-Credentials:
Users that are interested in Leaked-Credentials are comparing it to the libraries listed below
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆469Updated 3 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆525Updated 3 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,481Updated this week
- ☆530Updated 9 months ago
- Header Exploitation HTTP☆478Updated this week
- A simple tool for bypassing file upload restrictions.☆831Updated 8 months ago
- ☆688Updated 5 months ago
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,140Updated 4 months ago
- An insane list of all dorks taken from everywhere from various different sources.☆581Updated 4 months ago
- My Private Bug Hunting Methodology☆282Updated 3 months ago
- A Modern Framework for Bug Bounty Hunting☆574Updated last month
- A modern tool written in Python that automates your xss findings.☆417Updated last year
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆681Updated this week
- 1337 Wordlists for Bug Bounty Hunting☆819Updated last month
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆577Updated this week
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆826Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆628Updated last year
- i will upload more templates here to share with the comunity.☆541Updated 11 months ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆523Updated 3 weeks ago
- ☆612Updated 7 months ago
- ☆520Updated 8 months ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆521Updated 2 months ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,292Updated this week
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year
- Real-world infosec wordlists, updated regularly☆1,464Updated this week
- Find subdomains with GPT, for free☆337Updated 11 months ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,077Updated 3 weeks ago
- ☆318Updated last month
- My Notes about Penetration Testing☆638Updated 2 weeks ago
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆412Updated 2 years ago