☆13Nov 17, 2021Updated 4 years ago
Alternatives and similar repositories for Ultimate-Bug-Bounty
Users that are interested in Ultimate-Bug-Bounty are comparing it to the libraries listed below
Sorting:
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 2 years ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- ☆34Sep 28, 2023Updated 2 years ago
- ☆36Jan 8, 2026Updated last month
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆56Jun 11, 2025Updated 8 months ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- ☆11Jun 10, 2025Updated 8 months ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated last month
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- OVO Api PHP Class [Unofficial]☆44May 17, 2022Updated 3 years ago
- This is my personal blog where I talk about science and technology, especially about offensive cybersecurity.☆12Dec 28, 2025Updated 2 months ago
- Don't just be a script Kiddie☆11Apr 19, 2023Updated 2 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- ☆12Dec 1, 2013Updated 12 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- ☆10May 12, 2017Updated 8 years ago
- ☆12Feb 1, 2022Updated 4 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- A bash script that will automatically install Bug Hunting tools used for recon☆179Jul 6, 2023Updated 2 years ago
- ☆43Jun 18, 2025Updated 8 months ago
- Professional C++ Fourth Edition source code☆12Apr 26, 2018Updated 7 years ago
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 4 months ago
- A CSGO game C4 bomb model based on stm32☆31Feb 24, 2026Updated last week
- Personal website, darkstar7471.com☆11Dec 16, 2021Updated 4 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 6 months ago