cf-checkCloudFlare Checker written in Go
Stars: ✭ 147 (+234.09%)
Awesome Bugbounty WriteupsA curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Stars: ✭ 2,429 (+5420.45%)
sub404A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+365.91%)
PassivehunterSubdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Stars: ✭ 83 (+88.64%)
HolyTipsA Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+2650%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+2.27%)
SQLi-Query-TamperingSQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (+179.55%)
HostPanicFind host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (-47.73%)
hack-pet🐰 Managing command snippets for hackers/bug bounty hunters. with pet.
Stars: ✭ 77 (+75%)
PriestExtract server and IP address information from Browser SSRF
Stars: ✭ 13 (-70.45%)
nerdbugFull Nuclei automation script with logic explanation.
Stars: ✭ 153 (+247.73%)
PayloadsPayload Arsenal for Pentration Tester and Bug Bounty Hunters
Stars: ✭ 421 (+856.82%)
VPS-Bug-Bounty-ToolsScript that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (+0%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+986.36%)
WDIRGood resources about web security that I have read.
Stars: ✭ 14 (-68.18%)
Reconky-Automated Bash ScriptReconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+279.55%)
HowtohuntTutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+6709.09%)
micro-sentryTiny Sentry client with idiomatic wrapper for Angular
Stars: ✭ 100 (+127.27%)
InventusInventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.
Stars: ✭ 80 (+81.82%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+325%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+420.45%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (+31.82%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+36.36%)
shaniaScan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (+22.73%)
apkizerapkizer is a mass downloader for android applications for all available versions.
Stars: ✭ 40 (-9.09%)
fdnssearchSwiftly search FDNS datasets from Rapid7 Open Data
Stars: ✭ 19 (-56.82%)
Bucket-FlawsBucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Stars: ✭ 43 (-2.27%)
project-blackPentest/BugBounty progress control with scanning modules
Stars: ✭ 279 (+534.09%)
Jira-LensFast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+320.45%)
EmissarySend notifications on different channels such as Slack, Telegram, Discord etc.
Stars: ✭ 33 (-25%)
Awesome-HTTPRequestSmugglingA curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻
Stars: ✭ 97 (+120.45%)
BurpSQLTruncSannerMessy BurpSuite plugin for SQL Truncation vulnerabilities.
Stars: ✭ 53 (+20.45%)
ICUAn Extended, Modulair, Host Discovery Framework
Stars: ✭ 40 (-9.09%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-25%)
BugBountyHuntingScriptsI built some bash functions to help me while doing mundane and repetitive tasks using BBRF, Nuclei or other Bug bounty tool.
Stars: ✭ 160 (+263.64%)
CommandGenInterfaceSimple vueJS based command generator which I developed in order to learn vueJS a little bit more.
Stars: ✭ 17 (-61.36%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-34.09%)
request smugglerHttp request smuggling vulnerability scanner
Stars: ✭ 203 (+361.36%)
Bug-HuntingA Collection of Notes, Methodologies, POCs and everything else related to Bug Hunting.
Stars: ✭ 110 (+150%)
Bugs-feedBug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...
Stars: ✭ 90 (+104.55%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (+206.82%)
roboxtractorExtract endpoints marked as disallow in robots files to generate wordlists.
Stars: ✭ 40 (-9.09%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (+138.64%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+90.91%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+372.73%)
SourceWolfAmazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (+200%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+222.73%)
ShadowCloneUnleash the power of cloud
Stars: ✭ 224 (+409.09%)
gosintGosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (+681.82%)
gradejsGradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+722.73%)
gf-patternsCollection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (-38.64%)
WhoEnumMass querying whois records
Stars: ✭ 24 (-45.45%)