kljunowsky / HuntersEyeLinks
HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains. The primary goal is to streamline and expedite the process of monitoring newly registered subdomains and SSL certificates related to specified target domains.
☆18Updated last year
Alternatives and similar repositories for HuntersEye
Users that are interested in HuntersEye are comparing it to the libraries listed below
Sorting:
- Authorization-Nuclei-Templates☆40Updated 10 months ago
- This Tool To Test Machine Keys In View State☆74Updated 9 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Updated last week
- ☆34Updated 3 years ago
- About Recon Tools,Methodology and writeups☆18Updated last year
- ☆21Updated last year
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆73Updated 6 months ago
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆28Updated 8 months ago
- web cache deception detect☆29Updated 2 months ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37Updated 2 years ago
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Updated 4 years ago
- Results from analyzing data gathered from 1.6 billion subdomains☆30Updated 9 months ago
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆53Updated 2 years ago
- Nuclei Templates☆23Updated 9 months ago
- the POC of package.json RCE☆22Updated last month
- BChecks collection for Burp Suite Professional☆100Updated last year
- ☆23Updated 2 months ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆33Updated 2 years ago
- ☆134Updated 9 months ago
- ☆46Updated 2 years ago
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆49Updated 4 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆143Updated last year
- ☆16Updated 2 weeks ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year
- ☆47Updated last month
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆28Updated last year
- ☆19Updated last year
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Updated last year
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆94Updated last year
- Some of the gf patterns which i use☆44Updated 3 years ago