pdelteil / scammy-bbp
Self-hosted bug bounty programs that are "scammy" or unethical
☆117Updated 3 weeks ago
Alternatives and similar repositories for scammy-bbp:
Users that are interested in scammy-bbp are comparing it to the libraries listed below
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆34Updated 4 months ago
- ♥☆93Updated 4 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆142Updated this week
- ☆127Updated 3 years ago
- ☆161Updated 2 months ago
- ☆155Updated 6 months ago
- Useful configurations for the DomLogger++ extension☆33Updated 4 months ago
- Gather results of dorks across a number of search engines☆90Updated 2 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆138Updated 3 months ago
- 10,000 H1 Disclosed Reports☆99Updated 8 months ago
- Quick research done on some bug bounty blogs! Check em out :)☆117Updated last week
- ☆94Updated last year
- Chrome extension for automating CSPT discovery☆54Updated 3 months ago
- ☆125Updated 3 years ago
- ☆161Updated 3 months ago
- 🛠️ Workflows created by the community☆62Updated 6 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆239Updated 2 weeks ago
- ☆190Updated 2 weeks ago
- ☆94Updated 4 months ago
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆78Updated 2 months ago
- get all nuclei temp from emad shanab repo in one run☆33Updated last year
- ☆140Updated 2 years ago
- ☆34Updated 3 weeks ago
- Burp extension to create target specific and tailored wordlist from burp history.☆233Updated 3 years ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆120Updated 5 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆120Updated 6 months ago
- ☆152Updated last year
- CT Log Scanner☆306Updated 4 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆129Updated last month
- Automation of tokens/api keys testing.☆121Updated last year