mrdesoky0 / vulnerabilitiesLinks
☆59Updated 3 months ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- 10,000 H1 Disclosed Reports☆118Updated last year
- ♥☆174Updated 5 months ago
- ☆128Updated 5 months ago
- **A powerful, offline, single-file HTML tool designed for developers and security researchers to inspect and analyze JavaScript Source Ma…☆88Updated 3 months ago
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆54Updated last year
- BackupFinder discovers backup files on web servers by generating intelligent patterns.☆103Updated 6 months ago
- Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own person…☆130Updated last month
- ☆30Updated 5 months ago
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Updated last year
- Self-hosted bug bounty programs that are "scammy" or unethical☆166Updated last month
- ☆85Updated last year
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆115Updated last year
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆97Updated last week
- ☆232Updated 10 months ago
- ☆114Updated 3 weeks ago
- my nuclei templates☆41Updated last year
- ☆58Updated 5 months ago
- ☆129Updated 4 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Updated last year
- ☆101Updated 10 months ago
- Chrome extension for automating CSPT discovery☆135Updated last month
- Gather results of dorks across a number of search engines☆198Updated 2 weeks ago
- ☆61Updated last year
- My Notes on Regular Expressions for AWAE/OSWE.☆37Updated 2 years ago
- ☆46Updated last year
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆182Updated last year
- get all nuclei temp from emad shanab repo in one run☆36Updated 2 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆144Updated last year
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆149Updated last year
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Updated last year