Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation
☆483Mar 14, 2026Updated this week
Alternatives and similar repositories for claude-bug-bounty
Users that are interested in claude-bug-bounty are comparing it to the libraries listed below
Sorting:
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆210Feb 22, 2026Updated 3 weeks ago
- BugBounty-Recon-Methodology☆176Mar 11, 2026Updated last week
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆30Updated this week
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive securi…☆951Updated this week
- This is POC for IOS 0click CVE-2025-43300☆107Aug 24, 2025Updated 6 months ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆38Apr 5, 2025Updated 11 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Find XSS payloads that actually work by filtering them based on real-world constraints instead of blind payload spraying.☆143Mar 8, 2026Updated last week
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 8 months ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆122Dec 29, 2025Updated 2 months ago
- Browser-based Android security auditing tool.☆64Feb 6, 2026Updated last month
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- 微信公众号安全漏洞文章链接聚合☆28Updated this week
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated 3 weeks ago
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration☆12Jun 2, 2024Updated last year
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- Collection of exploits developed by your friendly clown☆14Oct 18, 2025Updated 5 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,352Mar 13, 2026Updated last week
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆31Jan 11, 2026Updated 2 months ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 3 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks☆1,547Jan 16, 2026Updated 2 months ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- ☆15Sep 11, 2020Updated 5 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated last month
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- ☆421Jan 13, 2026Updated 2 months ago
- ☆52Oct 1, 2025Updated 5 months ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago