It's my solution for bugbounty automation
☆22Feb 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for autobb
Users that are interested in autobb are comparing it to the libraries listed below
Sorting:
- Public OCI-Image (docker image) Security Checker☆21Feb 16, 2026Updated last month
- GitLab CI security tools runner☆18Feb 3, 2023Updated 3 years ago
- Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-…☆16Apr 13, 2024Updated last year
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 3 months ago
- Check bitrix vulnerabilities☆92Jan 22, 2024Updated 2 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆13Dec 30, 2024Updated last year
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆42Oct 30, 2024Updated last year
- ☆16Jan 23, 2026Updated last month
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆52Oct 11, 2025Updated 5 months ago
- ☆13Sep 15, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- ☆86Feb 4, 2026Updated last month
- A collection of bypasses and exploits for eBPF-based cloud security.☆26Jan 12, 2024Updated 2 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated last year
- ☆11Dec 22, 2023Updated 2 years ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- A basic Redis leaderboard demo app written in Go☆12Aug 15, 2023Updated 2 years ago
- Wordpress Plugins List☆24Jun 17, 2019Updated 6 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Jan 19, 2022Updated 4 years ago
- Hacking Tricks, Techniques & Tools☆16Sep 18, 2020Updated 5 years ago
- ☆21Feb 10, 2026Updated last month
- Codeaudit - Modern Python source code security analyzer based on distrust.☆27Mar 12, 2026Updated last week
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆23Apr 8, 2025Updated 11 months ago
- Jet Container Security Framework (JCSF)☆63Feb 13, 2026Updated last month
- ☆14Apr 24, 2023Updated 2 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Resources to learn about Insecure Deserialization☆17Jul 12, 2024Updated last year
- Developers Excuses☆11May 28, 2016Updated 9 years ago
- A BurpSuite extension that allows you to use Chromium with PwnFox☆43Dec 23, 2025Updated 2 months ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- ☆13Mar 14, 2026Updated last week
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago