sabir789 / BugBountyTipsLinks
Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypass 403 and 401 HTTP response codes, along with various tips and tricks for bug bounty hunting. If you're passionate about finding vulnerabilities and improving security, this is the right place for you!
☆19Updated 11 months ago
Alternatives and similar repositories for BugBountyTips
Users that are interested in BugBountyTips are comparing it to the libraries listed below
Sorting:
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆34Updated last year
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆39Updated last month
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆64Updated 9 months ago
- Bypass Reset Password Code Lead to Account Takeover☆26Updated last year
- Tools and methods that I personally use for Recon and Exploitations☆45Updated 7 months ago
- Grep subdomains from web pages.☆45Updated 10 months ago
- URL Fuzzer☆20Updated last year
- ☆36Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 5 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆65Updated last year
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆12Updated 5 months ago
- ☆44Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Updated 7 months ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆53Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆31Updated this week
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆67Updated last year
- Firebase_Checker is Python tool to analyze APK files and web applications for Firebase-related vulnerabilities. This tool identifies secu…☆51Updated last month
- Private Nuclei Templates☆100Updated 9 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆79Updated 2 weeks ago
- ☆19Updated 8 months ago
- A passive way to find backups/ sensitive information.☆91Updated 5 months ago
- Host Header Vulnerability Scanner Automated Tool☆27Updated 7 months ago
- ☆70Updated 2 years ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆45Updated last year
- Tools for bug bounty☆29Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆118Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆42Updated 10 months ago
- ☆59Updated last year
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆49Updated 2 weeks ago