niraj1mahajan / open_redirectLinks
Open Redirect Payloads
☆29Updated 3 years ago
Alternatives and similar repositories for open_redirect
Users that are interested in open_redirect are comparing it to the libraries listed below
Sorting:
- Tutorials and Things to Do while Hunting Vulnerability.☆91Updated 3 years ago
- My small collection of reports templates☆84Updated 5 years ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆32Updated 2 years ago
- ☆98Updated 2 years ago
- recon from myerspective☆47Updated 2 years ago
- ☆51Updated 4 years ago
- ☆30Updated 3 years ago
- xss-payload-list☆119Updated last year
- ♥☆140Updated 11 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆41Updated 11 months ago
- ☆34Updated 5 years ago
- Chart-Of-Wordlist helps to create your own custom wordlist. Also in one repository, you can find a list of awesome wordlist.☆63Updated 3 years ago
- A collection of notes for bug bounty hunting☆259Updated last year
- ☆138Updated 3 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆34Updated last year
- Tool for collect subdomains from different websites but the unique in tool collect subdomains from subdomainfinder.c99 and collect all su…☆26Updated 2 years ago
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Updated 11 months ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- Power of .bashrc and .bash_aliases☆30Updated 2 years ago
- Automated tool for domains & subdomains gathering☆188Updated 2 years ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆29Updated 2 years ago
- ☆106Updated 2 years ago
- ☆51Updated 4 years ago
- Some files for bruteforcing certain things.☆24Updated 4 years ago
- ☆73Updated 11 months ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆10Updated 4 years ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆38Updated 3 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆32Updated last year
- Check List☆80Updated 3 years ago
- Your AI javascript collaborator☆37Updated 3 months ago