xalgord / My-MethodologiesLinks
Tools and methods that I personally use for Recon and Exploitations
☆44Updated 3 months ago
Alternatives and similar repositories for My-Methodologies
Users that are interested in My-Methodologies are comparing it to the libraries listed below
Sorting:
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆22Updated 9 months ago
- ☆41Updated last year
- Host Header Vulnerability Scanner Automated Tool☆23Updated 3 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Updated last year
- BugSquasher Bug Bounty Tools List☆20Updated 2 years ago
- ☆40Updated 3 years ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated 2 years ago
- Private Nuclei Templates☆100Updated 5 months ago
- All in one web Recon app☆39Updated last year
- ☆17Updated last year
- my nuclei templates☆41Updated last year
- Nuclei Templates☆23Updated 9 months ago
- ☆23Updated 10 months ago
- ☆27Updated last year
- Xssor.go is a xss reflections checker for urls☆71Updated 2 years ago
- ☆66Updated 11 months ago
- ☆24Updated last year
- tools to find xss in a website☆61Updated 3 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆27Updated last year
- Tools for bug bounty☆27Updated 3 weeks ago
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆40Updated 2 years ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 10 months ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆82Updated 3 weeks ago
- A passive way to find backups/ sensitive information.☆86Updated 3 weeks ago
- HackLiners: CyberSec/BugHunting OneLiners☆59Updated 9 months ago
- ☆68Updated 2 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- ☆68Updated last year