☆57Oct 29, 2020Updated 5 years ago
Alternatives and similar repositories for Can-I-take-over-xyz-v2
Users that are interested in Can-I-take-over-xyz-v2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆29Dec 13, 2023Updated 2 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- Security pentesting/devsecops/bug bounty/Cloud etc.☆20Feb 7, 2024Updated 2 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place☆267Oct 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- GraphQL security workshop labs☆118Jan 31, 2026Updated last month
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆32Mar 19, 2025Updated last year
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- ☆17May 7, 2021Updated 4 years ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆20Aug 9, 2022Updated 3 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 4 years ago
- ☆42Jul 14, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- ☆14May 9, 2023Updated 2 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- ☆150Nov 27, 2021Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- Script to test open Akamai ARL vulnerability.☆69Aug 11, 2021Updated 4 years ago
- ☆53Aug 27, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- Just lists of lists of lists !☆17Oct 13, 2025Updated 5 months ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- List of Google Dorks for sites that have responsible disclosure program & bug bounty program☆32Apr 25, 2024Updated last year
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- XSS reflector vulnerabilities exploitation extended.☆27Jul 25, 2021Updated 4 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆106Feb 22, 2021Updated 5 years ago
- A Proof of Concept for Clickjacking Attacks☆70Jan 30, 2021Updated 5 years ago