linuxadi / 40k-nuclei-templates
40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
☆283Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for 40k-nuclei-templates
- ☆298Updated last year
- i will upload more templates here to share with the comunity.☆528Updated 7 months ago
- My Priv8 Nuclei Templates☆286Updated 6 months ago
- My Private Bug Hunting Methodology☆269Updated 3 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆413Updated last month
- XSS payloads for bypassing WAF. This repository is updating continuously.☆221Updated 8 months ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆269Updated 5 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆378Updated last year
- ☆512Updated 4 months ago
- ☆235Updated 3 years ago
- Automated Tool for Testing Header Based Blind SQL Injection☆263Updated last year
- Top disclosed reports from HackerOne☆148Updated 3 years ago
- ☆492Updated 5 months ago
- Repository of Bug-Bounty Writeups☆232Updated this week
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆183Updated 4 months ago
- A collection oneliner scripts for bug bounty☆171Updated 8 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆252Updated 7 months ago
- ☆106Updated 3 months ago
- Smart context-based SSRF vulnerability scanner.☆347Updated 2 years ago
- ☆184Updated last year
- A modern tool written in Python that automates your xss findings.☆378Updated 11 months ago
- Never forget where you inject.☆211Updated last year
- Useful "Match and Replace" burpsuite rules☆338Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆429Updated last month
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆220Updated this week
- ☆127Updated last year
- Local File Inclusion discovery and exploitation tool☆224Updated last month
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆108Updated 3 months ago