☆38Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for BugBountyTargets
Users that are interested in BugBountyTargets are comparing it to the libraries listed below
Sorting:
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- BackupFinder discovers backup files on web servers by generating intelligent patterns.☆104Jul 29, 2025Updated 7 months ago
- ☆39Jul 1, 2025Updated 8 months ago
- This Chromium extension scans the page for external iFrames, Scripts, and Styles, logs them to the console, and checks if their domains a…☆68Jan 6, 2026Updated 2 months ago
- ☆30Sep 9, 2025Updated 6 months ago
- ☆30Jun 30, 2025Updated 8 months ago
- ☆28Nov 3, 2024Updated last year
- ☆42Nov 19, 2025Updated 3 months ago
- Locally scan all the repositories of a github organization☆33Jul 20, 2025Updated 7 months ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- ☆33Jun 6, 2024Updated last year
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- ☆15Mar 21, 2025Updated 11 months ago
- Collection of templates from various resources☆43Dec 5, 2025Updated 3 months ago
- A resources for who want to learn and get deep into client-side bugs☆426Dec 8, 2024Updated last year
- ☆60Sep 8, 2025Updated 6 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- GUI library for LÖVE2D☆13Aug 17, 2024Updated last year
- Tools and methods that I personally use for Recon and Exploitations☆50May 1, 2025Updated 10 months ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆29Feb 25, 2026Updated last week
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- script that grabs urls from google dork or search and outputs to TXT file☆11Jul 19, 2023Updated 2 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Open the source file with bug from the browser☆18Jan 26, 2026Updated last month
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆18Nov 18, 2025Updated 3 months ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- ☆26Mar 1, 2026Updated last week
- Java安全相关,目前主要是CC链研究☆10Sep 1, 2022Updated 3 years ago
- A list of companies that offer positions for software developers☆14Apr 14, 2016Updated 9 years ago
- 废物自救项目!一起向光而行!!!☆11May 7, 2022Updated 3 years ago
- Awesome linter for FactoryBot☆12Jun 30, 2023Updated 2 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- ☆13Jun 11, 2025Updated 8 months ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Feb 19, 2022Updated 4 years ago
- 这是由Rust实现的纯Socks5协议☆12May 11, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- ☆20Jan 8, 2026Updated 2 months ago