xalgord / My-Methodologies
Tools and methods that I personally use for Recon and Exploitations
☆28Updated 3 weeks ago
Alternatives and similar repositories for My-Methodologies:
Users that are interested in My-Methodologies are comparing it to the libraries listed below
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 2 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 2 years ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated last year
- ☆34Updated last year
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆12Updated last year
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆16Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- ☆20Updated last year
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆38Updated 2 years ago
- ☆15Updated 4 months ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆18Updated 11 months ago
- HackLiners: CyberSec/BugHunting OneLiners☆55Updated 3 months ago
- Bypass Reset Password Code Lead to Account Takeover☆22Updated 4 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 7 months ago
- Tools for bug bounty☆27Updated 11 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆32Updated last year
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆32Updated last year
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Updated last year
- Nuclei Templates☆18Updated 3 months ago
- Web Crawler for Identifying Entry Points☆11Updated 10 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆46Updated last week
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆29Updated 3 months ago
- Automatic tool to find Google Dorks☆32Updated 3 months ago
- ☆16Updated last year
- Ultimate Google Dork Lists OSWP top 10☆51Updated 5 months ago