A small script for my recon during bug hunting. Needs some modifications
☆17Mar 5, 2020Updated 5 years ago
Alternatives and similar repositories for Hunter
Users that are interested in Hunter are comparing it to the libraries listed below
Sorting:
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- information gathering☆282Jul 12, 2025Updated 7 months ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Simple shell script for automated domain recognition with some tools☆304Nov 11, 2020Updated 5 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated 3 weeks ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Sep 20, 2024Updated last year
- TugaRecon is an advanced subdomain reconnaissance and intelligence framework built for security researchers, penetration testers and OSIN…☆186Feb 21, 2026Updated last week
- Toggle Burp proxy from anywhere and get its status in i3wm☆23Sep 2, 2024Updated last year
- Ninjref is a fast & light tool for finding urls with reflected parameters from wayback & CommonCrawl it's use threads in threads to optim…☆23Oct 22, 2020Updated 5 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Dec 22, 2016Updated 9 years ago
- A simple reconnaissance framework for bug bounty hunting☆37Oct 16, 2020Updated 5 years ago
- فایل های دوره ی آموزش گیمپ به زبان فارسی و کاملا رایگان از سایت آواسام با تدریس سام نیکزاد☆11Jan 1, 2024Updated 2 years ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Check List☆81Jul 16, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- Walkie Talkie with Arduino Nano and nRF24L01☆10Sep 16, 2022Updated 3 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Jan 12, 2026Updated last month
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆450Jul 21, 2020Updated 5 years ago
- A repository of some useful grep patterns for tomnomnoms gf tool☆38Oct 11, 2020Updated 5 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- ☆10Jun 26, 2017Updated 8 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago