Twitter vulnerable snippets
☆1,112Feb 11, 2026Updated 2 weeks ago
Alternatives and similar repositories for vulnerable-code-snippets
Users that are interested in vulnerable-code-snippets are comparing it to the libraries listed below
Sorting:
- A small collection of vulnerable code snippets☆789Sep 30, 2024Updated last year
- Top disclosed reports from HackerOne☆5,343Jan 31, 2026Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,771May 22, 2024Updated last year
- All about bug bounty (bypasses, payloads, and etc)☆6,655Sep 8, 2023Updated 2 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,149May 13, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,290Aug 7, 2025Updated 6 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,497Jan 8, 2026Updated last month
- Mind-Maps of Several Things☆2,626Jun 29, 2023Updated 2 years ago
- Obtain GraphQL API schema even if the introspection is disabled☆1,396Dec 5, 2025Updated 2 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,547Aug 6, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,676May 24, 2025Updated 9 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,524Jan 15, 2026Updated last month
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,291Aug 7, 2024Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,077Jul 29, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,034Jun 25, 2025Updated 8 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,075Aug 14, 2024Updated last year
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆772Dec 9, 2025Updated 2 months ago
- Rockyou for web fuzzing☆3,023Feb 11, 2026Updated 2 weeks ago
- An IIS short filename enumeration tool☆1,123Nov 25, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,543Feb 7, 2026Updated 3 weeks ago
- Hidden parameters discovery suite☆2,027Sep 8, 2024Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,837Jan 1, 2025Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,917Oct 4, 2025Updated 4 months ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,010Jun 24, 2024Updated last year
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆814Jun 9, 2025Updated 8 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆888May 3, 2023Updated 2 years ago
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,983Updated this week
- bypass-url-parser☆1,113Feb 21, 2026Updated last week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,382Sep 14, 2023Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,208Jan 31, 2026Updated last month
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,650Oct 7, 2025Updated 4 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,565Feb 8, 2025Updated last year
- Burp Suite Certified Practitioner Exam Study☆1,323Feb 5, 2026Updated 3 weeks ago
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is int…☆954Jan 17, 2025Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,153Jan 21, 2026Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆975Jan 12, 2024Updated 2 years ago