tcrsecurity / Cheat-for-common-bugs-for-Bug-Bounty-HuntingView external linksLinks
☆20Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for Cheat-for-common-bugs-for-Bug-Bounty-Hunting
Users that are interested in Cheat-for-common-bugs-for-Bug-Bounty-Hunting are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated 10 months ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- Recon for Pentesting and BugBounty 🕵️☆13Jan 14, 2026Updated last month
- ☆13Jun 26, 2025Updated 7 months ago
- ☆10Apr 6, 2024Updated last year
- My Notes & Resources Of Bug Bounty Checklists☆83Dec 28, 2024Updated last year
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 8 months ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated last year
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- This script identifies Host Header Injection vulnerabilities in a list of URLs or a specific domain, outputting the vulnerable locations …☆15May 23, 2023Updated 2 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- ☆35Aug 2, 2022Updated 3 years ago
- Passively check for XSS character encodings☆18Feb 7, 2026Updated last week
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- ☆40Jul 24, 2022Updated 3 years ago
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆27Sep 17, 2021Updated 4 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆29Nov 7, 2023Updated 2 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 2 months ago
- Host Header Vulnerability Scanner Automated Tool☆28Apr 18, 2025Updated 9 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- 简单记录下自己在挖掘SRC☆33Sep 21, 2020Updated 5 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- Some wordlists collected form github to all bug bounty hunters.☆39Jul 30, 2021Updated 4 years ago
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 2 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- Multithreading loop fuzzing with `ffuf` into your subdomains list with unique results☆31May 12, 2024Updated last year
- ☆66Jan 14, 2023Updated 3 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆40Oct 2, 2023Updated 2 years ago
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆10Mar 9, 2021Updated 4 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆19Sep 12, 2022Updated 3 years ago