ZileExtract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-78.75%)
Mutual labels: cybersecurity, bugbounty
py-scripts-otherA collection of some of my scripts
Stars: ✭ 79 (-72.47%)
Mutual labels: cybersecurity, bugbounty
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+2981.53%)
Mutual labels: cybersecurity, security-vulnerability
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-36.59%)
Mutual labels: security-vulnerability, bugbounty
Xxe Injection Payload List🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+5.92%)
Mutual labels: cybersecurity, bugbounty
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-41.11%)
Mutual labels: cybersecurity, bugbounty
WatchdogWatchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+20.21%)
Mutual labels: security-vulnerability, bugbounty
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-84.32%)
Mutual labels: cybersecurity, bugbounty
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-70.73%)
Mutual labels: cybersecurity, bugbounty
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-68.29%)
Mutual labels: security-vulnerability, bugbounty
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-91.64%)
Mutual labels: security-vulnerability, bugbounty
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-78.4%)
Mutual labels: security-vulnerability, bugbounty
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+88.5%)
Mutual labels: cybersecurity, bugbounty
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+579.09%)
Mutual labels: cybersecurity, bugbounty
SuperLibraryInformation Security Library
Stars: ✭ 60 (-79.09%)
Mutual labels: cybersecurity, bugbounty
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-70.38%)
Mutual labels: cybersecurity, bugbounty
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-68.29%)
Mutual labels: cybersecurity