-
Updated
May 18, 2020
#
bug-bounty
Here are 90 public repositories matching this topic...
A collection of various awesome lists for hackers, pentesters and security researchers
android
security
awesome
reverse-engineering
pentesting-windows
hacking
penetration-testing
bug-bounty
fuzzing
Web path scanner
python
security
scanner
hacking
bruteforce
penetration-testing
bug-bounty
fuzzing
pentesting
pentest
fuzzer
appsec
dirsearch
dirbuster
scanner-web
-
Updated
Jul 2, 2020 - Python
A list of resources for those interested in getting started in bug bounties
-
Updated
Jul 2, 2020
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
-
Updated
Jul 7, 2020 - Go
Collection of quality safety articles
github
java
dns
security
list
research
web
hacking
waf
xss
bug-bounty
src
pentest
hacker
acknowledgments
fuzz
sec
ruby-programs
xxe
websec
redteam
bounty-hunters
quality-safety-articles
-
Updated
Jul 7, 2020
Subdomain Takeover tool written in Go
go
golang
security
subdomain
bug-bounty
infosec
pentesting
bugbounty
takeover
hostile
subdomain-takeover
-
Updated
May 13, 2020 - Go
This challenge is Inon Shkedy's 31 days API Security Tips.
-
Updated
Apr 12, 2020
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
-
Updated
Jul 6, 2020 - Java
Open
Streamline logging
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
python
security
hacking
penetration-testing
certificate-transparency
bug-bounty
pentest
information-gathering
monitoring-tool
reconnaissance
certificate-transparency-logs
sublert
-
Updated
Apr 27, 2020 - Python
GlitchWitchSec
commented
Jun 15, 2019
Operating System: Ubuntu 18.04
Describe the bug
When navigating to the payloads section from a sub-section of the targets page, the sub-section stays highlighted and is no longer clickable.
To Reproduce
Steps to reproduce the behavior:
- Go to a sub-section of a target.
- Click on Payloads
- Click on the same subsection you just left.
- Section does not change. Stays on pay
A Powerful Subdomain Takeover Tool
subdomain
bug-bounty
pentesting
bugbounty
subdomains
takeover
hostile
subdomain-takeover
takeover-subdomain
hostile-subdomain-takeover
-
Updated
Aug 30, 2018 - Go
Reconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
-
Updated
May 23, 2020 - Go
Collection of small security tools created mostly in Python. CTFs, pentests and so on
python
scanner
static-analysis
hacking
bug-bounty
infosec
pentesting
ctf
bugbounty
ctf-tools
webappsec
security-tools
itsecurity
bug-bounties
security-testing
-
Updated
Jul 5, 2020 - Python
SRCMS企业应急响应与缺陷管理系统
-
Updated
Oct 11, 2019 - JavaScript
Hawkeye filesystem analysis tool
-
Updated
Jul 21, 2018 - Go
xml
hacking
cybersecurity
bug-bounty
infosec
bugbounty
information-security
payload
payloads
cyber-security
websecurity
web-application-security
xxe
xxe-injection
websecurity-reference
xxe-payloads
xxe-example
xml-entity
xxe-payload
xxe-payload-list
-
Updated
Jan 6, 2020
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
android
kotlin
webview
kotlin-android
apk
bug-bounty
pentesting
android-studio
ctf
vulnerabilities
flutter
android-security
security-testing
flutter-security
flutter-xss
-
Updated
Jun 19, 2020 - Java
security
bug-bounty
application-security
bugbounty
appsec
payload
payloads
lfi
rfi
web-hacking
websecurity
web-application-security
security-research
security-researcher
lfi-exploitation
payload-list
lfi-vulnerability
security-researchers
rfi-exploiton
rfi-vulnerabillity
-
Updated
Jan 9, 2020
A permutation generation tool written in golang
golang
hacking
bruteforce
bug-bounty
infosec
recon
netsec
subdomains
subdomain-discovery
bruteforce-subdomain
-
Updated
Jul 15, 2019 - Go
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
-
Updated
Dec 30, 2019 - Python
bash scripting thing !
-
Updated
Jul 5, 2020 - Shell
ScanT3r - Web Security Scanner
linux
python3
rce
bug-bounty
sql-injection
web-security
xss-scanners
hacking-tool
web-scanner
hacking-tools
ssti
-
Updated
Jul 11, 2020 - Python
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
-
Updated
Jun 29, 2020 - Go
This is a simple tool to automate google hacking when doing web penetration testing or bug hunting.
google
bug-bounty
automated
vulnerability-detection
hacking-tool
google-hacking
google-hacking-database
googledork
hacking-tools
-
Updated
Mar 5, 2020 - Python
Micro-framework for rapid development of reusable security tools
perl
tricks
hacking
toolbox
exploits
bug-bounty
pentesting
ctf
ctf-tools
security-tools
spellbook
security-spellbook
-
Updated
Jul 11, 2020 - Perl
Simple Server Side Request Forgery services enumeration tool.
-
Updated
Aug 23, 2018 - Ruby
Credentials Checking Framework
framework
python3
bug-bounty
pentesting
bugbounty
python2
bugcrowd
pentest-scripts
hackerone
pentest-tool
postexplotation
postexploit
-
Updated
Dec 24, 2019 - Python
Improve this page
Add a description, image, and links to the bug-bounty topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the bug-bounty topic, visit your repo's landing page and select "manage topics."


The following things should be fixed:
column: old => newAlso, consider:
selectas a base for detailed