password123456 / huntr-com-bug-bounties-collector
keep watching new bug bounty (vulnerability) postings.
☆13Updated 11 months ago
Alternatives and similar repositories for huntr-com-bug-bounties-collector:
Users that are interested in huntr-com-bug-bounties-collector are comparing it to the libraries listed below
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Advanced test for proxy & waf☆13Updated 6 months ago
- Yet Another Mac Changer!!!☆11Updated 2 years ago
- FireHawk: The Elite Firebase Security Testing Utility☆20Updated 10 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 9 months ago
- your bestfried for finding LinkedIn Employees on github☆16Updated last year
- ☆17Updated last year
- Looks for parameters in urls☆34Updated 5 months ago
- This repository contains the best fuzzing wordlist files☆29Updated 3 months ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated 4 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 10 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Template Nuclei SSTI☆29Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 3 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- ☆27Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 3 months ago
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 7 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 7 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆30Updated 8 months ago