sachinn403 / Bug-Bounty-Tools
Awesome Bug bounty tools
☆12Updated 9 months ago
Alternatives and similar repositories for Bug-Bounty-Tools:
Users that are interested in Bug-Bounty-Tools are comparing it to the libraries listed below
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated 3 weeks ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 6 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆17Updated 8 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- ☆158Updated 5 months ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆14Updated 9 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- Web Penetration Testing Course Materials☆32Updated 10 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 9 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆45Updated this week
- This script Crawl the website and find the urls that contains html forms.☆71Updated 9 months ago
- ☆27Updated 9 months ago
- ☆16Updated 8 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆110Updated 3 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆61Updated last month
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated last year
- ☆118Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆110Updated 5 months ago
- ☆196Updated last month
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆58Updated this week
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆148Updated 4 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 8 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- ☆51Updated 3 months ago
- A list of all Active Directory machines from HackTheBox☆57Updated 2 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- Collection of Facebook Bug Bounty Writeups☆29Updated last year
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆76Updated 2 months ago