hackThacker / Bug-Bounty-Tools
Your Comprehensive Collection of Bug Bounty Tools for Effective Cybersecurity Testing
☆64Updated last year
Related projects: ⓘ
- A distributed network mapper/security scanner.☆16Updated last year
- ☆44Updated 2 weeks ago
- Powershell Scripts for Blue Team members☆12Updated 9 months ago
- A Proof of Concept Rootkit Demonstrating Keylogging and Virtual File System (VFS) Capabilities☆72Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆13Updated 4 months ago
- Tool for reconnaissance of AWS cloud environments☆13Updated 11 months ago
- HOOK-Worm Pentest the Modern Web☆110Updated last year
- ☆14Updated this week
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆10Updated 2 weeks ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated 8 months ago
- Lightweight WhoIs client☆24Updated 6 months ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆9Updated last year
- ☆11Updated 8 months ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆24Updated last year
- ☆16Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆25Updated 3 months ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆10Updated 2 years ago
- ☆14Updated this week
- hiding in plain sight: part 2☆40Updated 2 months ago
- Stupid Simple Detection Testing☆11Updated 6 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 7 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆46Updated 9 months ago
- Subdomain crawler with wordlist using python☆13Updated 4 years ago
- PowerShell Script Analyzer☆64Updated 10 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆11Updated 4 years ago
- Field guide to gather low-hanging fruits☆13Updated 6 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 2 months ago