A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Jun 16, 2024
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
A collection of various awesome lists for hackers, pentesters and security researchers
[Custom || Automated] Curation & Collection of BugBounty Wordlists
📦 1000+ Statically Linked Binaries & Build Scripts for Android (arm64-v8a), Linux (aarch64 | x86-64), Windows (AMD64) :: https://bin.ajam.dev
A collection of one-liners for bug bounty hunting.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
This repository contains Bug Bounty writeups
A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), GitHub, Facebook (Meta), OpenAI (GPTBot) and other with daily updates.
The Internets #1 Subdomain Takeover Tool
Get some useful data from Clouds for your targets
Resources, repos and scripts for pentesters and bug bounty.
Asset inventory of over 800 public bug bounty programs.
The most exhaustive list of reliable DNS resolvers.
My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.
A Security Tool for Bug Bounty, Pentest and Red Teaming.
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Stalker, the Extensible Attack Surface Management tool.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties