WebApp for BugBounty Hunters
☆14Mar 24, 2017Updated 9 years ago
Alternatives and similar repositories for bugbounty
Users that are interested in bugbounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Feb 9, 2017Updated 9 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆12Nov 19, 2018Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- ☆15Mar 21, 2025Updated last year
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- A Collection of Wordlists for Penetration Testing☆35Mar 13, 2026Updated 3 weeks ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13Jan 28, 2017Updated 9 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 3 months ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 3 years ago
- A modular URL deduplication tool.☆19Feb 19, 2025Updated last year
- Database of websites for penetration testing☆183Jan 15, 2020Updated 6 years ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year
- Project Moore: a Wagtail/Django based web-application for the UTN IT infrastructure☆14Mar 11, 2024Updated 2 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- The RedStack DB extracted as an Obsidian Vault☆42Dec 25, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- ☆13Sep 8, 2024Updated last year
- ☆15Jun 26, 2025Updated 9 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- Recon Custom WordList Ganerator☆58Jul 2, 2020Updated 5 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- An ultra-compact intro (or refresher) to Web Application Security.☆32Feb 15, 2018Updated 8 years ago
- Authentication and meeting management for Jitsi Meet☆13May 25, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A command-line tool for codeforces website☆11Dec 8, 2022Updated 3 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- ☆14Aug 10, 2022Updated 3 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- Debian 8 (Jessie) Docker container for Ansible playbook and role testing.☆11Dec 7, 2020Updated 5 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year