The Bug Hunters Methodology
☆4,265Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for tbhm
Users that are interested in tbhm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,399Sep 14, 2023Updated 2 years ago
- Setup script for Regon-ng☆939Nov 17, 2020Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,076Jul 31, 2024Updated last year
- ☆2,321Dec 8, 2023Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,605Feb 8, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- a collection of handy bookmarks☆1,109Dec 30, 2023Updated 2 years ago
- A list of resources for those interested in getting started in bug bounties☆11,906Jul 23, 2024Updated last year
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,510Mar 7, 2026Updated 2 weeks ago
- Open source education content for the researcher community☆2,760Apr 13, 2022Updated 3 years ago
- A Tool for Domain Flyovers☆5,912May 22, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,476Jan 9, 2025Updated last year
- A python script that finds endpoints in JavaScript files☆4,309Apr 13, 2024Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,581Aug 6, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,660Jan 5, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This script is intended to automate your reconnaissance process in an organized fashion☆2,028Aug 19, 2021Updated 4 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,113Aug 14, 2024Updated last year
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,675Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,363Sep 30, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,057Jun 25, 2025Updated 9 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,851Nov 10, 2023Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,907Sep 27, 2021Updated 4 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,254Mar 13, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,555Jul 21, 2025Updated 8 months ago
- HTTP parameter discovery suite.☆6,154Feb 20, 2025Updated last year
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,364May 1, 2024Updated last year
- The XSS Hunter service - a portable version of XSSHunter.com☆1,543Dec 7, 2022Updated 3 years ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,092Jun 22, 2024Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,860Updated this week
- In-depth attack surface mapping and asset discovery☆14,282Updated this week
- DNS Takeover tool written in Go☆2,034Mar 16, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fetch many paths for many hosts - without killing the hosts☆1,708Feb 3, 2024Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated last week
- A collection of hacks and one-off scripts☆2,425Mar 13, 2025Updated last year
- ☆834Nov 13, 2023Updated 2 years ago
- A collection of tools to perform searches on GitHub.☆1,471Feb 9, 2023Updated 3 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,131Apr 21, 2024Updated last year
- Knock Subdomain Scan☆4,148Feb 19, 2026Updated last month