proditis / bugbounty-cicdLinks
A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements
☆26Updated 2 years ago
Alternatives and similar repositories for bugbounty-cicd
Users that are interested in bugbounty-cicd are comparing it to the libraries listed below
Sorting:
- Manage attack surface data on Elasticsearch☆22Updated last year
- S3 bucket enumerator☆30Updated 6 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 10 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 7 months ago
- Tool for scanning domains for .git directories.☆16Updated last year
- ☆27Updated 2 years ago
- Public repo of Nuclei scanner templates.☆18Updated 2 years ago
- Ffuf output browser☆39Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 2 months ago
- FireProx written in Go☆20Updated last year
- vhost scanning☆36Updated last year
- Additional active scan checks for BURP☆27Updated 8 months ago
- ☆17Updated 2 years ago
- Advanced test for proxy & waf☆13Updated 9 months ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 10 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 10 months ago
- ☆12Updated 4 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆21Updated last year
- ☆52Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A utility for recursively traversing SSL/TLS certificates for collecting DNS names☆47Updated last year
- Exploits Unauth Docker API☆41Updated 2 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆44Updated last year