wh04M1i / One-LinersLinks
A collection of awesome one-liners for bug bounty hunting.
☆9Updated last year
Alternatives and similar repositories for One-Liners
Users that are interested in One-Liners are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10Updated last month
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆19Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 9 months ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated 2 years ago
- my own 2fa bypass methodolgy☆24Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆41Updated 3 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆31Updated last week
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- All in one web Recon app☆39Updated last year
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆13Updated last year
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Updated last year
- A multi web security purposes tool☆39Updated last month
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆22Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Red Team scripts written in python☆17Updated 2 years ago
- Tools and methods that I personally use for Recon and Exploitations☆40Updated last month
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆25Updated 3 years ago
- Do bug hunting with One-Line script and get bounty☆17Updated last year
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆25Updated 4 years ago
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆19Updated 6 months ago
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆68Updated 9 months ago