xalgord / My-MethodologiesLinks
Tools and methods that I personally use for Recon and Exploitations
☆40Updated last month
Alternatives and similar repositories for My-Methodologies
Users that are interested in My-Methodologies are comparing it to the libraries listed below
Sorting:
- ☆41Updated last year
- All in one web Recon app☆39Updated last year
- ☆25Updated 2 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- Host Header Vulnerability Scanner Automated Tool☆23Updated 2 months ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 7 months ago
- BugSquasher Bug Bounty Tools List☆20Updated 2 years ago
- ☆27Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- ☆23Updated 9 months ago
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated 2 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆82Updated 3 months ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆19Updated last year
- ☆39Updated 3 years ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 9 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 8 months ago
- Private Nuclei Templates☆100Updated 4 months ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆29Updated 2 years ago
- This script can be used to find html forms in the list of endpoints/urls.☆48Updated last year
- my nuclei templates☆40Updated last year
- ☆17Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆30Updated last year
- Tools for bug bounty☆27Updated last year
- get all nuclei temp from emad shanab repo in one run☆35Updated 2 years ago
- Fast Bug Bounty Script☆37Updated 5 months ago
- ☆24Updated last year
- A Series of Tweets☆16Updated last year
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year