BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.
☆34Jan 26, 2026Updated last month
Alternatives and similar repositories for BugBoard
Users that are interested in BugBoard are comparing it to the libraries listed below
Sorting:
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 4 months ago
- Site Admin Page Finder with Python Script | Edited By Sir.4m1R☆19Aug 22, 2017Updated 8 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆66Aug 15, 2024Updated last year
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Lists various tools used in hardware hacking.☆32Jan 25, 2026Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- There is my vuln POC and EXP. Some of POC were collected, most of POC and EXP were written by myself.☆13May 28, 2022Updated 3 years ago
- Browser extension that finds HTML comments.☆12Aug 8, 2024Updated last year
- ☆77Sep 27, 2024Updated last year
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Aug 8, 2021Updated 4 years ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 10 months ago
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated 11 months ago
- ☆170Sep 20, 2024Updated last year
- Dump paths & pages from Next.js Manifest☆15Mar 19, 2024Updated last year
- ☆15May 6, 2023Updated 2 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆109Aug 21, 2025Updated 6 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- [Confluence] CVE-2023-22527 realworld poc☆19Jan 23, 2024Updated 2 years ago
- Check for the existence of an email on Google platforms☆18Mar 20, 2024Updated last year
- Automated tool for domains & subdomains gathering☆191Jan 30, 2026Updated 3 weeks ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆34Aug 21, 2024Updated last year
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 7 months ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- ☆17Sep 15, 2023Updated 2 years ago
- ☆47Mar 7, 2025Updated 11 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆45Jan 25, 2026Updated last month
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆25Jun 14, 2022Updated 3 years ago
- ☆47Feb 12, 2026Updated 2 weeks ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆45Mar 8, 2025Updated 11 months ago
- Smuggler can detect and exploit -HTTP Smuggling- vulnerabilities.☆42Oct 31, 2024Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆98Jan 25, 2026Updated last month