workflow-builder / rekLinks
e2e Scanning research module
β22Updated 3 months ago
Alternatives and similar repositories for rek
Users that are interested in rek are comparing it to the libraries listed below
Sorting:
- π XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.β116Updated last year
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Villageβ177Updated last year
- β217Updated this week
- β415Updated last month
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.β164Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioβ¦β179Updated 2 weeks ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.β226Updated 4 months ago
- My Private Bug Hunting Methodologyβ308Updated 10 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methodsβ¦β100Updated 11 months ago
- Automate Recon XSS Bug Bountyβ173Updated 3 months ago
- β160Updated 9 months ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.β92Updated last month
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.β178Updated 6 months ago
- β37Updated 8 months ago
- A modern tool written in Python that automates your xss findings.β453Updated last year
- β463Updated 2 weeks ago
- β49Updated last week
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a varβ¦β44Updated 4 months ago
- β123Updated 8 months ago
- β131Updated last year
- A resources for who want to learn and get deep into client-side bugsβ320Updated 10 months ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.β223Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.β373Updated last year
- β90Updated 2 weeks ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & mβ¦β155Updated last week
- Nuclei-AI-Promptsβ323Updated 3 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.β240Updated 9 months ago
- β182Updated 11 months ago
- β132Updated 8 months ago
- Dorks for Bug Bounty Huntingβ186Updated last year