itsmohitnarayan / awesome-bug-bountyLinks
A curated list of resources, tools, and wordlists for bug bounty hunters.
☆16Updated last year
Alternatives and similar repositories for awesome-bug-bounty
Users that are interested in awesome-bug-bounty are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆42Updated 3 years ago
- Google Dorks and keywords for bug hunters.☆14Updated 4 years ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆61Updated 7 months ago
- ☆44Updated last year
- My Notes & Resources Of Bug Bounty Checklists☆81Updated 11 months ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆28Updated 2 years ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆74Updated last year
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆50Updated 4 years ago
- ☆17Updated 2 years ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆28Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆35Updated last year
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆28Updated last week
- Tools and methods that I personally use for Recon and Exploitations☆45Updated 6 months ago
- ☆29Updated last year
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆42Updated 2 years ago
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆62Updated last week
- ☆28Updated 2 months ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆21Updated 2 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Updated last year
- A powerful reconnaissance tool written in Bash scripting. It can be used to scan networks, gather information about hosts, and identify v…☆17Updated 2 years ago
- A simple plugin to export JS files from one or multiple targets☆43Updated 2 years ago
- ☆17Updated 2 years ago
- ☆19Updated last year
- ☆108Updated 2 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆36Updated last year
- ☆26Updated 2 years ago
- Dorks for Bug Bounty Hunting☆188Updated last year
- Detect SSRF within Caido☆34Updated last month
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Updated 9 months ago