Here I gather all the resources about hacking that I find interesting
☆270Mar 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for easyg
Users that are interested in easyg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 1337 Wordlists for Bug Bounty Hunting☆937Updated this week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Real world bug bounty wordlists☆116Jul 20, 2023Updated 2 years ago
- My small collection of reports templates (This is a fork of orignal repo from https://github.com/gwen001/BB-datas)☆127Nov 8, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Oct 15, 2022Updated 3 years ago
- ☆631Dec 19, 2025Updated 3 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- The motive to build this repo is to help beginner to start learn Android Pentesting by providing a roadmap.☆439Jul 11, 2022Updated 3 years ago
- ☆755Jun 26, 2024Updated last year
- ☆1,116Jul 26, 2023Updated 2 years ago
- ☆300Dec 9, 2022Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Top disclosed reports from HackerOne☆162Apr 15, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆36Jun 23, 2022Updated 3 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- script python to check url list via cookies and Authorization☆19Feb 28, 2023Updated 3 years ago
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,776Oct 7, 2025Updated 5 months ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,725Updated this week
- All about bug bounty (bypasses, payloads, and etc)☆6,672Sep 8, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Mind-Maps of Several Things☆2,632Jun 29, 2023Updated 2 years ago
- Tool designed for fast crawl and extract endpoints☆16Apr 5, 2021Updated 4 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,159May 13, 2023Updated 2 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 3 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,581Aug 6, 2023Updated 2 years ago
- Repositories, Links, Payloads, Blogs, Tools, etc.. which I think might be useful for pentesting and bug bounty☆49Jan 6, 2026Updated 2 months ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆53Jul 14, 2021Updated 4 years ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Simple tool to gather domains from crt.sh using the organization name☆102Dec 16, 2021Updated 4 years ago
- These are my checklists which I use during my hunting.☆857Nov 30, 2023Updated 2 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,893Sep 25, 2023Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- Tool for testing reflections in the HTTP responses☆60Jun 10, 2023Updated 2 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Here Are Some Bug Bounty Resource From Twitter☆123Feb 18, 2026Updated last month