shubhdhungana / coolsubhLinks
This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.
☆29Updated 2 years ago
Alternatives and similar repositories for coolsubh
Users that are interested in coolsubh are comparing it to the libraries listed below
Sorting:
- Tool for collect subdomains from different websites but the unique in tool collect subdomains from subdomainfinder.c99 and collect all su…☆26Updated 2 years ago
- ☆96Updated 2 years ago
- ☆105Updated 2 years ago
- Simple tool to gather domains from crt.sh using the organization name☆100Updated 3 years ago
- Some files for bruteforcing certain things.☆24Updated 4 years ago
- My small collection of reports templates☆82Updated 5 years ago
- ☆73Updated 9 months ago
- Power of .bashrc and .bash_aliases☆30Updated 2 years ago
- My Notes & Resources Of Bug Bounty Checklists☆70Updated 6 months ago
- Ultimate Wordlist for Web Content Discovery☆68Updated 2 months ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆30Updated last year
- xss-payload-list☆118Updated 11 months ago
- recon from myerspective☆47Updated 2 years ago
- Check List☆81Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆90Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆10Updated 4 years ago
- ☆50Updated 4 years ago
- A collection of automation scripts for bug bounty hunting.☆31Updated 2 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- ☆39Updated 3 years ago
- Tips For Bug Bounty Hunters☆85Updated 3 years ago
- ☆26Updated 2 weeks ago
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆37Updated 2 years ago
- My custom created nuclei for SQLi, bugbounty, pentesting☆26Updated 2 months ago
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆49Updated 4 years ago
- Nuclei Templates☆23Updated 8 months ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year
- ☆135Updated 3 years ago
- Open Redirect Payloads☆29Updated 3 years ago
- Dorks for Bug Bounty Hunting☆176Updated last year