AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude Code.
☆1,946May 1, 2026Updated last week
Alternatives and similar repositories for claude-bug-bounty
Users that are interested in claude-bug-bounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🤹 Caido AI Skills☆193Apr 17, 2026Updated 3 weeks ago
- BugBounty-Recon-Methodology☆268Updated this week
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆276Mar 19, 2026Updated last month
- Discover Exposed AI Services☆80Apr 28, 2026Updated last week
- Rerousces related to time-travel debugging (TTD)☆41Jan 6, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.☆254Apr 17, 2026Updated 3 weeks ago
- NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive securi…☆1,066Mar 29, 2026Updated last month
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆47Mar 19, 2026Updated last month
- ☆24Oct 17, 2024Updated last year
- Top disclosed reports from HackerOne☆5,895Apr 25, 2026Updated 2 weeks ago
- Browser-based Android security auditing tool.☆71Mar 29, 2026Updated last month
- Turn Claude Code into your offensive security research assistant. Specialized AI subagents for authorized penetration testing plan engage…☆831Updated this week
- Automated web vulnerability scanning with LLM agents☆463Jun 18, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,471Feb 10, 2024Updated 2 years ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,280Jul 18, 2024Updated last year
- Generate Claude Code bug bounty skills from public HackerOne reports and GitHub writeups — 18 vuln classes, no private reports needed☆165Mar 12, 2026Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,494Updated this week
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more☆1,070Apr 22, 2026Updated 2 weeks ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,824May 22, 2024Updated last year
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆40May 1, 2026Updated last week
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- ☆34Sep 21, 2024Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,838Apr 17, 2026Updated 3 weeks ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,606Apr 12, 2026Updated 3 weeks ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,985Oct 4, 2025Updated 7 months ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- 754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF…☆6,108Apr 26, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool to migrate Burpsuite HTTP history to Caido☆37Apr 25, 2025Updated last year
- ☆58Mar 9, 2026Updated 2 months ago
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆84Apr 16, 2026Updated 3 weeks ago
- Asset inventory of over 800 public bug bounty programs.☆1,543Feb 14, 2025Updated last year
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆61Feb 26, 2024Updated 2 years ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆5,040Dec 21, 2024Updated last year
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year