samogod / bugradar
Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.
☆95Updated 2 years ago
Related projects: ⓘ
- Enumerate Subdomains Through Google Dorks☆118Updated 3 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆47Updated 3 years ago
- Private Nuclei Templates☆88Updated last year
- Describe how to use ffuf different options with examples☆75Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆100Updated 2 years ago
- Here Are Some Bug Bounty Resource From Twitter☆82Updated 4 months ago
- Simple tool to gather domains from crt.sh using the organization name☆97Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆95Updated last year
- ☆107Updated last year
- ☆139Updated last year
- ☆97Updated this week
- ☆96Updated 2 years ago
- ☆69Updated last year
- Tips For Bug Bounty Hunters☆82Updated 2 years ago
- Nuclei Templates - Here you will find the templates I use while hunting☆116Updated 2 years ago
- Learning and hunting SQL injection bugs for 50 continuous days☆74Updated 2 years ago
- ☆38Updated 2 months ago
- ☆142Updated last year
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated last year
- All Type of Payloads☆127Updated 5 months ago
- ☆52Updated last month
- Bug Bounty & Other Stuff☆52Updated 2 years ago
- ☆48Updated 3 years ago
- A collection oneliner scripts for bug bounty☆167Updated 5 months ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆56Updated 5 months ago
- ☆116Updated 3 years ago
- Check List☆71Updated 2 years ago
- ☆63Updated this week
- Real world bug bounty wordlists☆107Updated last year
- Automated Subdomain Enumeration and Scanning Tool☆107Updated 11 months ago
- A Proof of Concept for Clickjacking Attacks☆50Updated 3 years ago