Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed VPS or Linux Operating System.
☆32Jan 27, 2026Updated 3 months ago
Alternatives and similar repositories for Bounty-VPS
Users that are interested in Bounty-VPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of Fresh DNS resolvers updates every 1 hour☆19May 2, 2026Updated last week
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆55Aug 9, 2025Updated 9 months ago
- ☆46Dec 23, 2024Updated last year
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆53Jan 16, 2026Updated 3 months ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 9 months ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Mar 24, 2026Updated last month
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- Cross-compile GnuPG for Windows using Docker☆17Apr 4, 2026Updated last month
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated 2 years ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆11Sep 10, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆20Jul 23, 2025Updated 9 months ago
- Detect and extract hidden files☆24Aug 29, 2024Updated last year
- WPF helper library☆14Apr 6, 2019Updated 7 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 11 months ago
- hello world in different languages☆10Feb 14, 2024Updated 2 years ago
- opensource NPU for LLM inference (this run gpt2)☆78Feb 16, 2026Updated 2 months ago
- ☆10Aug 21, 2024Updated last year
- ☆10Jun 16, 2021Updated 4 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- very currency, Bitcoin ABC edition☆18Apr 15, 2026Updated 3 weeks ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆95Oct 5, 2025Updated 7 months ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆17Jul 10, 2025Updated 9 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- NetVuln 2.0 - As the Predeccessor to NetVuln 1.0 - This Newer program will not only be able to perform a port scan and subdomain scan b…☆21Aug 11, 2025Updated 8 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆39Jul 29, 2025Updated 9 months ago
- ☆10May 4, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆27Dec 20, 2022Updated 3 years ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 4 months ago
- UAdmin Phishlets for common sites☆17Jun 12, 2025Updated 10 months ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- ☆10Apr 1, 2025Updated last year
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆97Feb 14, 2026Updated 2 months ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago