Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]
☆29Jan 6, 2021Updated 5 years ago
Alternatives and similar repositories for db
Users that are interested in db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A Burp Suite Professional extension for decrypting/decoding various types of cookies.☆12Jun 12, 2019Updated 6 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Modified version of Process monitor that bypasses procmon detection for anti-debuggers☆24May 6, 2024Updated last year
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 5 years ago
- A blind XSS detection and XSS data capture framework☆175Dec 6, 2025Updated 3 months ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server☆81Jan 8, 2024Updated 2 years ago
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- Scan any HackerOne program with Nuclei☆14Sep 21, 2021Updated 4 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Feb 14, 2025Updated last year
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Feb 19, 2021Updated 5 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆105Jun 28, 2022Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- ☆44Sep 25, 2025Updated 5 months ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 5 years ago
- ☆16May 3, 2021Updated 4 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated 2 years ago