h4x0r-dz / Leaked-CredentialsLinks
how to look for Leaked Credentials !
☆987Updated last year
Alternatives and similar repositories for Leaked-Credentials
Users that are interested in Leaked-Credentials are comparing it to the libraries listed below
Sorting:
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆674Updated 4 months ago
- An insane list of all dorks taken from everywhere from various different sources.☆707Updated 10 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆870Updated last year
- A simple tool for bypassing file upload restrictions.☆879Updated last year
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆671Updated 3 weeks ago
- Header Exploitation HTTP☆645Updated this week
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆491Updated 3 months ago
- A modern tool written in Python that automates your xss findings.☆453Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year
- ☆566Updated last month
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,332Updated last month
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,588Updated last week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,713Updated last month
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆720Updated last month
- 1337 Wordlists for Bug Bounty Hunting☆849Updated last month
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆332Updated last year
- ☆457Updated last week
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆763Updated last month
- My Private Bug Hunting Methodology☆307Updated 10 months ago
- ☆620Updated last year
- A Modern Framework for Bug Bounty Hunting☆624Updated 7 months ago
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,134Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆371Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆540Updated last week
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆443Updated 4 months ago
- HTTP 403 bypass tool☆539Updated last year
- ChatGPT Prompts for Bug Bounty & Pentesting☆656Updated 2 years ago
- Nuclei-AI-Prompts☆317Updated 3 months ago
- These are my checklists which I use during my hunting.☆664Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆450Updated 2 weeks ago