iamthefrogy / nerdbug
Full Nuclei automation script with logic explanation.
☆243Updated 2 years ago
Alternatives and similar repositories for nerdbug:
Users that are interested in nerdbug are comparing it to the libraries listed below
- Nuclei templates written by us.☆267Updated 3 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- ☆236Updated 3 years ago
- ☆318Updated last month
- Useful "Match and Replace" burpsuite rules☆342Updated last year
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆215Updated 6 months ago
- ☆286Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆184Updated last month
- ☆155Updated last year
- Nuclei Templates - Here you will find the templates I use while hunting☆116Updated 3 years ago
- Enumerate Subdomains Through Google Dorks☆123Updated 3 years ago
- ☆151Updated last year
- Smart context-based SSRF vulnerability scanner.☆349Updated 2 years ago
- ☆167Updated 2 years ago
- Check AWS S3 instances for read/write/delete access☆120Updated 3 years ago
- Prototype pollution scanner using headless chrome☆216Updated 2 years ago
- List of reporting templates I have used since I started doing BBH.☆284Updated 5 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆306Updated 3 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆466Updated 2 years ago
- Burpsuite plugin for Interact.sh☆215Updated 8 months ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆272Updated 8 months ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆239Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆262Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆104Updated 3 years ago
- Real world bug bounty wordlists☆110Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆181Updated 2 years ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆293Updated 5 months ago
- Make URL path combinations using a wordlist☆173Updated last year
- All Type of Payloads☆134Updated 11 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆316Updated 2 months ago