trickest / inventoryLinks
Asset inventory of over 800 public bug bounty programs.
☆1,436Updated 5 months ago
Alternatives and similar repositories for inventory
Users that are interested in inventory are comparing it to the libraries listed below
Sorting:
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,368Updated 2 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,597Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,415Updated this week
- declutters url lists for crawling/pentesting☆1,414Updated 5 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,306Updated last month
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆996Updated this week
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,522Updated 3 years ago
- Nuclei Templates Collection☆1,018Updated 3 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,142Updated 2 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,143Updated last week
- A repository that includes all the important wordlists used while bug hunting.☆1,331Updated 2 years ago
- Community curated list of public bug bounty and responsible disclosure programs.☆1,197Updated 2 weeks ago
- bypass-url-parser☆1,081Updated last week
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆881Updated 2 years ago
- Fast and customizable subdomain wordlist generator using DSL☆841Updated 3 weeks ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,162Updated 2 months ago
- Subdomain takeover vulnerability checker☆1,293Updated 11 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆993Updated 2 weeks ago
- Go client to communicate with Chaos DB API.☆747Updated 2 weeks ago
- Real-world infosec wordlists, updated regularly☆1,544Updated this week
- Awesome Bug bounty builder Project☆672Updated 2 years ago
- 1337 Wordlists for Bug Bounty Hunting☆840Updated 6 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆983Updated last year
- ☆734Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆878Updated last year
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆909Updated 2 years ago
- Automation for javascript recon in bug bounty.☆1,033Updated last year
- Automated & Manual Wordlists provided by Assetnote☆1,493Updated 2 weeks ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,670Updated 3 weeks ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,276Updated 3 weeks ago