smaul0 / Bug-Bounty-ResourcesView external linksLinks
Write-ups of All types Bugs
☆21Apr 13, 2022Updated 3 years ago
Alternatives and similar repositories for Bug-Bounty-Resources
Users that are interested in Bug-Bounty-Resources are comparing it to the libraries listed below
Sorting:
- ☆10Jan 30, 2022Updated 4 years ago
- Crack Dict☆11Oct 12, 2020Updated 5 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- A plugin for IDA Pro and Cheat Engine to get the offset of the current module☆11May 30, 2024Updated last year
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- Domain availbility checker☆39Mar 7, 2021Updated 4 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 8 years ago
- ☆16Dec 9, 2015Updated 10 years ago
- Client side web application build to help Youtubers deal with thousands of comments☆10Apr 29, 2020Updated 5 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- PHP底层内核源码分析和扩展开发☆11Oct 20, 2017Updated 8 years ago
- Highly recommended dorks for bug bounty☆19Oct 17, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 10 months ago
- CaDiCaL + neural glue variable predictions☆10Oct 21, 2020Updated 5 years ago
- Shadowsocks/ShadowsocksR 账号在线监控☆12Nov 25, 2018Updated 7 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Jan 19, 2023Updated 3 years ago
- 2020年~2021年 网站CMS、中间件、框架系统漏洞集合☆99Mar 3, 2021Updated 4 years ago
- 一个可将源代码中的注释部分翻译成指定的语言的小工具☆16May 12, 2022Updated 3 years ago
- Windows 微信 Key读取工具 C++版☆12May 22, 2023Updated 2 years ago
- I wrote a C++ project for metasploit or CobaltStrike...login_user:root、pass:jhhua☆12Jan 4, 2022Updated 4 years ago
- CVE-2017-16995(Ubuntu本地提权漏洞)☆13Sep 8, 2021Updated 4 years ago
- 在学习Java反序列化漏洞的过程中,用来理解Java RMI程序的执行流程,演示如何攻击Java RMI程序的几个示例。☆11May 6, 2020Updated 5 years ago
- ssh and sftp☆13Nov 10, 2022Updated 3 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- ☆16Apr 24, 2024Updated last year
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- Explained in few steps what should one do in order to be able to inspect mobile (iOS and Android) app☆12Jul 12, 2017Updated 8 years ago
- Come on a tool to decode "MD5" + "Sha1" + "Sha256" even if it is very difficult☆13Oct 9, 2022Updated 3 years ago
- 利用阿里的云函数发送电子邮件☆22Dec 20, 2021Updated 4 years ago
- SUCTF iCloudMusic 源码及writeup☆10Oct 12, 2022Updated 3 years ago