All Type of Payloads
☆142Mar 26, 2024Updated 2 years ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Jeeves SQLI Finder☆216May 13, 2022Updated 3 years ago
- My Priv8 Nuclei Templates☆340May 12, 2024Updated last year
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Here Are Some Bug Bounty Resource From Twitter☆123Feb 18, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- I collected it to help the bug hunter get a reward☆56Sep 7, 2022Updated 3 years ago
- Automated tool for domains & Subdomains Gathering☆14Feb 26, 2026Updated last month
- Awesome Bug bounty builder Project☆675Feb 15, 2023Updated 3 years ago
- ☆173Nov 20, 2025Updated 4 months ago
- ☆15May 6, 2023Updated 2 years ago
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- Some of the gf patterns which i use☆44Jan 19, 2022Updated 4 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- Useful "Match and Replace" burpsuite rules☆365Sep 26, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A path-normalization pentesting tool.☆153Jan 22, 2026Updated 2 months ago
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- ☆32Dec 30, 2022Updated 3 years ago
- ☆128Jul 15, 2021Updated 4 years ago
- Finding XSS during recon☆272Sep 13, 2022Updated 3 years ago
- ☆139Nov 9, 2024Updated last year
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- 海康威视iVMS 综合安防任意文件上传 漏洞使用exp☆24Jun 13, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A list of resources for those interested in getting started in bug bounties☆13Jun 18, 2020Updated 5 years ago
- Automated Recon for Pentesting & Bug Bounty☆434Nov 3, 2025Updated 4 months ago
- GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.☆102Jul 12, 2025Updated 8 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆28Jul 20, 2022Updated 3 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- Private Nuclei Templates☆99Feb 24, 2025Updated last year
- ☆865Dec 26, 2025Updated 3 months ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- A repository that includes all the important wordlists used while bug hunting.☆1,386Mar 11, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Aug 18, 2020Updated 5 years ago
- ☆1,116Jul 26, 2023Updated 2 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- tools to find xss in a website☆62Apr 27, 2022Updated 3 years ago