niraj1mahajan / open_redirect
Open Redirect Payloads
☆28Updated 3 years ago
Alternatives and similar repositories for open_redirect:
Users that are interested in open_redirect are comparing it to the libraries listed below
- recon from myerspective☆47Updated 2 years ago
- ☆30Updated 3 years ago
- ☆94Updated last year
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆16Updated 4 months ago
- Power of .bashrc and .bash_aliases☆31Updated 2 years ago
- My small collection of reports templates☆76Updated 5 years ago
- ☆49Updated 4 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 4 months ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆26Updated last year
- ☆62Updated 4 months ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆29Updated 2 years ago
- Check List☆77Updated 2 years ago
- ☆32Updated 4 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆89Updated 3 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆12Updated 4 years ago
- Contains nuclei templates for security testing and POCs.☆17Updated 3 months ago
- Tool for collect subdomains from different websites but the unique in tool collect subdomains from subdomainfinder.c99 and collect all su…☆26Updated 2 years ago
- get all nuclei temp from emad shanab repo in one run☆33Updated last year
- ☆83Updated 3 years ago
- Some files for bruteforcing certain things.☆24Updated 3 years ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆10Updated 3 years ago
- A resources for who want to learn and get deep into client-side bugs☆26Updated 2 months ago
- ♥☆97Updated 4 months ago
- My Notes on Regular Expressions for AWAE/OSWE.☆29Updated last year
- Chart-Of-Wordlist helps to create your own custom wordlist. Also in one repository, you can find a list of awesome wordlist.☆63Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆26Updated last year
- Tips For Bug Bounty Hunters☆84Updated 2 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- Ultimate Wordlist for Web Content Discovery☆67Updated 2 months ago