soy-elmago / Magic-CheckList-for-Web-ApplicationsLinks
Web Security Checklist (Bug Bounty & Pentesting)
☆170Updated 3 months ago
Alternatives and similar repositories for Magic-CheckList-for-Web-Applications
Users that are interested in Magic-CheckList-for-Web-Applications are comparing it to the libraries listed below
Sorting:
- ☆128Updated 5 years ago
- mainRecon is an automated reconnaissance docker image for bugbounty hunter write in bash script.☆90Updated 3 years ago
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Yet another subdomain finder☆205Updated 5 years ago
- ☆375Updated 4 years ago
- information gathering☆284Updated 2 months ago
- My personal bug bounty toolkit.☆165Updated last year
- Random utilities from my security projects that might be useful to others☆182Updated 7 months ago
- Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @J…☆208Updated 3 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆174Updated 2 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆277Updated 2 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Updated 4 years ago
- API Pentesting notes.☆96Updated 10 months ago
- The tools I have programmed to help me with bugbounty's☆116Updated 5 years ago
- Simple recon using multiple tools!☆165Updated 3 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆237Updated 5 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆168Updated 5 years ago
- Simple shell script for automated domain recognition with some tools☆304Updated 4 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆215Updated 4 years ago
- A script that can resolve an input file of domains and scan them with masscan☆155Updated 5 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆73Updated 4 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- Secret and/or credential patterns used for gf.☆241Updated 2 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆416Updated 4 years ago
- this html file creates a csrf poc form to any http request.☆280Updated 2 years ago
- ☆363Updated 3 years ago
- Automating XSS using Bash☆357Updated last year
- Urls status code & content length checker☆148Updated 4 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆230Updated 3 years ago
- XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|ID…☆341Updated 2 years ago