Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed VPS or Linux Operating System.
☆31Jan 27, 2026Updated 2 months ago
Alternatives and similar repositories for Bounty-VPS
Users that are interested in Bounty-VPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆50Aug 9, 2025Updated 7 months ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 11 months ago
- Stream your PC audio in real-time to any device over LAN (Browser based, WASAPI loopback)☆37Nov 4, 2025Updated 4 months ago
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- Python command-line tool for interacting with AI models through the OpenRouter API/Cloudflare AI Gateway, or local self-hosted Ollama. O…☆21Dec 28, 2025Updated 3 months ago
- Cross-compile GnuPG for Windows using Docker☆17Mar 21, 2026Updated last week
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Dec 23, 2024Updated last year
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 6 months ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- apk binder script☆60Apr 7, 2014Updated 11 years ago
- ☆20Jul 23, 2025Updated 8 months ago
- Drones Logs Events And Properties Parser☆16Mar 28, 2024Updated 2 years ago
- opensource NPU for LLM inference (this run gpt2)☆60Feb 16, 2026Updated last month
- WPF helper library☆14Apr 6, 2019Updated 6 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- hello world in different languages☆10Feb 14, 2024Updated 2 years ago
- ☆10Aug 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆10Jun 16, 2021Updated 4 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- very currency, Bitcoin ABC edition☆18Oct 8, 2025Updated 5 months ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆16Jul 10, 2025Updated 8 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- NetVuln 2.0 - As the Predeccessor to NetVuln 1.0 - This Newer program will not only be able to perform a port scan and subdomain scan b…☆21Aug 11, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🤖📌 A GitHub App built with Probot that rotates pinned issues based on Good First Issue labels☆16Dec 15, 2018Updated 7 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- ESP32 based version of WireShark compatible nRF24/RFM7x packet sniffer☆12May 2, 2020Updated 5 years ago
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆36Jul 29, 2025Updated 8 months ago
- ☆27Dec 20, 2022Updated 3 years ago
- ☆10May 4, 2024Updated last year
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago