Bug Bounty Vps Setup Tools
☆117Dec 25, 2025Updated 3 months ago
Alternatives and similar repositories for OK-VPS
Users that are interested in OK-VPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆230Mar 29, 2024Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- A bash script that will automatically install Bug Hunting tools used for recon☆179Jul 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆526Oct 27, 2025Updated 5 months ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Automated Recon for Pentesting & Bug Bounty☆434Nov 3, 2025Updated 5 months ago
- oneliner commands for bug bounties☆460Jul 25, 2022Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,095Jul 29, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Vulnerable Code Snippets☆46Apr 2, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆869Dec 26, 2025Updated 3 months ago
- Find subdomains on GitHub.☆837Mar 28, 2023Updated 3 years ago
- XSS payloads for bypassing WAF. This repository is updating continuously.☆271Mar 15, 2024Updated 2 years ago
- Bug Bounty Tools used on Twitch - Recon☆322Sep 6, 2024Updated last year
- Like DLP☆11Jan 27, 2025Updated last year
- Collection of some pentesting and bugbounty resources☆49Feb 5, 2022Updated 4 years ago
- bash script for Subdomain Enumeration☆408Jul 30, 2025Updated 8 months ago
- ☆46Jan 9, 2024Updated 2 years ago
- ☆421Mar 26, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆97Apr 2, 2026Updated 2 weeks ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- ☆10Apr 6, 2024Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Automation for javascript recon in bug bounty.☆1,081Sep 9, 2023Updated 2 years ago
- ☆173Nov 20, 2025Updated 4 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆429Apr 7, 2026Updated last week
- A fuzzer for detecting open redirect vulnerabilities☆784Jul 1, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- ☆17May 21, 2022Updated 3 years ago
- ☆139Nov 9, 2024Updated last year
- Secret and/or credential patterns used for gf.☆243Feb 10, 2023Updated 3 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 5 months ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago