Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for information security bugbounty tool
bugbounty-tool
x
information-security
x
0 search results found
Go Dork
⭐
677
The fastest dork scanner written in Go.
Ppmap
⭐
325
A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.
Magicrecon
⭐
240
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Infosechouse
⭐
162
Tools & Resources for Cyber Security Operations
Webstor
⭐
119
A script to quickly enumerate all websites across all of your organization's networks, store their responses, and query for known web technologies, such as those with zero-day vulnerabilities.
Insiders
⭐
111
Archive of Potential Insider Threats
Nipejs
⭐
74
Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.
Gerobug
⭐
48
The First Open Source Bug Bounty Platform
Advancedkeyhacks
⭐
47
API Key/Token Exploitation Made easy.
Supertruder
⭐
22
A python3 intruder that gave me bounties, easy to use and as fast as fuff
Nucleimonst3r
⭐
15
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
Proxylist
⭐
14
List of continuously updated proxy servers
Massurl
⭐
13
A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Frida
⭐
12
Frida scripts for Android application dynamic-analysis.
Infosec Tips
⭐
9
Infosec writeups, Bug bounty tips, Tweets & Many more that are picked from around the world || I personally use it || I try to mend it daily. So, stay tuned and learn something
Bug Bounty Tips
⭐
8
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Online tips and explain the commands, for the better understanding of new hunters..
Digit
⭐
8
Extract endpoints from specific Git repository for fuzzing
Passive Subd
⭐
6
This is a Simple Bash Script for Automating gathering the Passive Subdomian Enumeration with various Tools.
1-0 of 0 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.