trickest / inventoryLinks
Asset inventory of over 800 public bug bounty programs.
☆1,507Updated 11 months ago
Alternatives and similar repositories for inventory
Users that are interested in inventory are comparing it to the libraries listed below
Sorting:
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,465Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,714Updated last year
- declutters url lists for crawling/pentesting☆1,518Updated 10 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,486Updated last week
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,480Updated this week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,470Updated 6 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,033Updated 4 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,279Updated 5 months ago
- A repository that includes all the important wordlists used while bug hunting.☆1,367Updated 2 years ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,556Updated 3 years ago
- Community curated list of public bug bounty and responsible disclosure programs.☆1,271Updated 2 weeks ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,242Updated 3 weeks ago
- Nuclei Templates Collection☆1,066Updated 3 weeks ago
- Automated & Manual Wordlists provided by Assetnote☆1,591Updated 3 weeks ago
- bypass-url-parser☆1,109Updated this week
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆917Updated 2 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,008Updated last year
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,390Updated last year
- ☆816Updated 3 weeks ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆887Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,071Updated last year
- Automation for javascript recon in bug bounty.☆1,064Updated 2 years ago
- Subdomain takeover vulnerability checker☆1,492Updated last year
- Go client to communicate with Chaos DB API.☆809Updated 3 weeks ago
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,176Updated last week
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆913Updated last month
- Fast and customizable subdomain wordlist generator using DSL☆905Updated last month
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,177Updated this week
- A tool for adding new lines to files, skipping duplicates☆1,600Updated 2 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,070Updated 4 months ago