A small script for my recon during bug hunting. Needs some modifications
☆17Mar 5, 2020Updated 6 years ago
Alternatives and similar repositories for Hunter
Users that are interested in Hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- information gathering☆282Jul 12, 2025Updated 8 months ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Icahn Graduate School of Medicine: Systems Biology & Biotechnology Specialization☆14Jun 17, 2017Updated 8 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated last month
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- TugaRecon is an advanced subdomain reconnaissance and intelligence framework built for security researchers, penetration testers and OSIN…☆187Feb 21, 2026Updated last month
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Sep 20, 2024Updated last year
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Premake's static website, with landing and download pages.☆10Mar 16, 2026Updated last week
- ☆26Feb 28, 2023Updated 3 years ago
- Learning and hunting SQL injection bugs for 50 continuous days☆75Aug 19, 2022Updated 3 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- JupyterCon Website☆14Mar 3, 2023Updated 3 years ago
- Toggle Burp proxy from anywhere and get its status in i3wm☆23Sep 2, 2024Updated last year
- Branding assets for the Hackathon Hackers and its subgroups☆11Aug 4, 2015Updated 10 years ago
- A tiny, high-performance HTTP image proxy☆16Nov 26, 2024Updated last year
- Lazily wraps various Linux system auditing tools☆20Updated this week
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Trying to make automated recon for bug bounties☆255May 3, 2021Updated 4 years ago
- Code for www.wbtc.network☆10Aug 4, 2020Updated 5 years ago
- Scan all possible TLD's for a given domain name☆83Jun 17, 2021Updated 4 years ago
- Rate-limiter module which leverages DynamoDB to enforce resource limits☆11Oct 11, 2023Updated 2 years ago
- Ninjref is a fast & light tool for finding urls with reflected parameters from wayback & CommonCrawl it's use threads in threads to optim…☆23Oct 22, 2020Updated 5 years ago
- Candidate solution for Facebook's fake news problem using machine learning and crowd-sourcing. Takes form of a Chrome extension. Develope…☆13Aug 25, 2017Updated 8 years ago
- A tool to extract firmware from an O.MG Cable☆11Mar 24, 2021Updated 4 years ago
- Nextflow hackathon 2017 projects☆10Sep 28, 2017Updated 8 years ago
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Dec 22, 2016Updated 9 years ago
- Check List☆80Jul 16, 2022Updated 3 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago