swisscom / bugbounty
Swisscom Vulnerability Disclosure Policy & Bug Bounty Programme
☆88Updated 2 weeks ago
Alternatives and similar repositories for bugbounty:
Users that are interested in bugbounty are comparing it to the libraries listed below
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆131Updated 5 months ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆50Updated last year
- ☆65Updated 2 years ago
- A path-normalization pentesting tool.☆120Updated last year
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆133Updated 2 months ago
- Extract JavaScript files from burp suite project with ease.☆87Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Updated last month
- ☆57Updated 10 months ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆39Updated last year
- Directory scans☆79Updated last year
- ☆139Updated 2 years ago
- ☆31Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆162Updated 4 months ago
- ☆72Updated 4 months ago
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆91Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆122Updated 7 months ago
- Useful configurations for the DomLogger++ extension☆34Updated 5 months ago
- A simple plugin to export JS files from one or multiple targets☆40Updated last year
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- unleashed ffuf☆110Updated 7 months ago
- This Tool To Test Machine Keys In View State☆64Updated 4 months ago
- Identify virtual hosts by similarity comparison☆116Updated 6 months ago
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆133Updated last year
- Recon-Ninja☆87Updated 10 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 5 months ago
- ☆77Updated 4 months ago
- Curated list of Meta (formerly Facebook) owned IT assets☆45Updated last year
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆61Updated 7 months ago
- ☆152Updated last year
- ☆128Updated 3 years ago