Asset inventory of over 800 public bug bounty programs.
☆1,562Feb 14, 2025Updated last year
Alternatives and similar repositories for inventory
Users that are interested in inventory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,737Updated this week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,554Mar 8, 2026Updated 2 months ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆276Sep 25, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,747Updated this week
- Rockyou for web fuzzing☆3,154Mar 11, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,043Aug 23, 2025Updated 8 months ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,374May 9, 2026Updated last week
- Community curated list of public bug bounty and responsible disclosure programs.☆1,298Apr 27, 2026Updated 3 weeks ago
- ☆754Jun 26, 2024Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,644Mar 8, 2026Updated 2 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 4 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,233Aug 14, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆92May 2, 2024Updated 2 years ago
- declutters url lists for crawling/pentesting☆1,555Feb 23, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,561Updated this week
- The most exhaustive list of reliable DNS resolvers.☆993Updated this week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,829May 22, 2024Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆519Jul 17, 2022Updated 3 years ago
- Hidden parameters discovery suite☆2,059Sep 8, 2024Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,937Mar 20, 2026Updated 2 months ago
- A repository that includes all the important wordlists used while bug hunting.☆1,399Mar 11, 2023Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,120Jul 29, 2024Updated last year
- Top disclosed reports from HackerOne☆6,018Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆938Aug 24, 2023Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,177Feb 23, 2026Updated 2 months ago
- Useful "Match and Replace" burpsuite rules☆370Sep 26, 2023Updated 2 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,729Sep 8, 2023Updated 2 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,997Oct 4, 2025Updated 7 months ago
- Filter and enrich a list of subdomains by level☆214Sep 25, 2023Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,336Mar 13, 2026Updated 2 months ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,426Sep 13, 2024Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,950May 14, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆225Aug 29, 2024Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,341Aug 7, 2025Updated 9 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,166Apr 3, 2026Updated last month
- Automation for javascript recon in bug bounty.☆1,086Sep 9, 2023Updated 2 years ago
- bypass-url-parser☆1,128May 9, 2026Updated last week
- Collection of methodology and test case for various web vulnerabilities.☆7,114Jun 25, 2025Updated 10 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,652Mar 21, 2026Updated 2 months ago