shifa123 / Can-I-take-over-xyz-v2View external linksLinks
☆56Oct 29, 2020Updated 5 years ago
Alternatives and similar repositories for Can-I-take-over-xyz-v2
Users that are interested in Can-I-take-over-xyz-v2 are comparing it to the libraries listed below
Sorting:
- ☆29Dec 13, 2023Updated 2 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 3 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Mar 19, 2025Updated 10 months ago
- GraphQL security workshop labs☆118Jan 31, 2026Updated 2 weeks ago
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place☆266Oct 21, 2021Updated 4 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆20Aug 9, 2022Updated 3 years ago
- Security pentesting/devsecops/bug bounty/Cloud etc.☆20Feb 7, 2024Updated 2 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Feb 10, 2020Updated 6 years ago
- ☆15Mar 21, 2025Updated 10 months ago
- Simple command shell collections☆35Mar 7, 2021Updated 4 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- ☆17May 7, 2021Updated 4 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆53Aug 27, 2020Updated 5 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆56Jan 10, 2022Updated 4 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- ☆90Oct 28, 2021Updated 4 years ago
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- ☆42Jul 14, 2021Updated 4 years ago
- A Proof of Concept for Clickjacking Attacks☆69Jan 30, 2021Updated 5 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆27Sep 17, 2021Updated 4 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago