sabir789 / BugBountyTipsLinks
Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypass 403 and 401 HTTP response codes, along with various tips and tricks for bug bounty hunting. If you're passionate about finding vulnerabilities and improving security, this is the right place for you!
☆17Updated 6 months ago
Alternatives and similar repositories for BugBountyTips
Users that are interested in BugBountyTips are comparing it to the libraries listed below
Sorting:
- Grep subdomains from web pages.☆42Updated 5 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆63Updated 11 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆60Updated 4 months ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 10 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆65Updated last year
- ☆35Updated 7 months ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆32Updated 8 months ago
- ☆42Updated 9 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆45Updated 6 months ago
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆28Updated 11 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 8 months ago
- ☆57Updated 10 months ago
- URL Fuzzer☆19Updated 7 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆40Updated 3 months ago
- A passive way to find backups/ sensitive information.☆84Updated this week
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆39Updated 8 months ago
- ☆37Updated 3 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆66Updated 3 months ago
- ☆24Updated last year
- Url scrapper or extractor from alienvault☆33Updated 4 months ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated 2 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆113Updated 8 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 5 months ago
- ☆23Updated 9 months ago
- A tool for inspecting and analyzing mobile application storage files.☆45Updated 2 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆32Updated 11 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆32Updated 5 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 8 months ago
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆73Updated 5 months ago