orwagodfather / virustotalxLinks
♥
☆168Updated 4 months ago
Alternatives and similar repositories for virustotalx
Users that are interested in virustotalx are comparing it to the libraries listed below
Sorting:
- ☆126Updated 4 months ago
- 10,000 H1 Disclosed Reports☆119Updated last year
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆54Updated last year
- ☆162Updated last year
- BackupFinder discovers backup files on web servers by generating intelligent patterns.☆100Updated 5 months ago
- ☆157Updated 3 weeks ago
- My Notes on Regular Expressions for AWAE/OSWE.☆37Updated 2 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆142Updated 11 months ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆96Updated 5 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆193Updated last year
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆180Updated 11 months ago
- ☆84Updated last year
- ☆100Updated 9 months ago
- Self-hosted bug bounty programs that are "scammy" or unethical☆164Updated last month
- ☆129Updated 4 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆277Updated last week
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Updated last year
- A Bash script for automated nuclei dast scanning by using passive urls☆122Updated 10 months ago
- ☆148Updated 11 months ago
- ☆22Updated 8 months ago
- My Priv8 Nuclei Templates☆335Updated last year
- A tool to slice URLs into directory levels☆18Updated last month
- ☆160Updated 11 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆112Updated last year
- ☆147Updated 4 years ago
- Collection of scripts and tools used during bug bounty work. This will be the location of my automation scripts created for my own person…☆123Updated 3 weeks ago
- ☆46Updated last year
- ☆165Updated last year
- my nuclei templates☆41Updated last year
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Updated last year