-
Updated
Mar 9, 2020
#
bug-bounty
Here are 63 public repositories matching this topic...
A collection of various awesome lists for hackers, pentesters and security researchers
android
security
awesome
reverse-engineering
pentesting-windows
hacking
penetration-testing
bug-bounty
fuzzing
Web path scanner
python
security
scanner
hacking
bruteforce
penetration-testing
bug-bounty
fuzzing
pentesting
pentest
fuzzer
appsec
dirsearch
dirbuster
scanner-web
-
Updated
Mar 8, 2020 - Python
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
-
Updated
Mar 9, 2020 - Go
A list of resources for those interested in getting started in bug bounties
-
Updated
Mar 9, 2020
Collection of quality safety articles
github
java
dns
security
list
research
web
hacking
waf
xss
bug-bounty
src
pentest
hacker
acknowledgments
fuzz
sec
ruby-programs
xxe
websec
redteam
bounty-hunters
quality-safety-articles
-
Updated
Mar 7, 2020
Subdomain Takeover tool written in Go
go
golang
security
subdomain
bug-bounty
infosec
pentesting
bugbounty
takeover
hostile
subdomain-takeover
-
Updated
Mar 9, 2020 - Go
This challenge is Inon Shkedy's 31 days API Security Tips.
-
Updated
Mar 9, 2020
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
-
Updated
Mar 9, 2020 - Java
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
python
security
hacking
penetration-testing
certificate-transparency
bug-bounty
pentest
information-gathering
monitoring-tool
reconnaissance
certificate-transparency-logs
sublert
-
Updated
Mar 2, 2020 - Python
GlitchWitchSec
commented
Jun 15, 2019
Operating System: Ubuntu 18.04
Describe the bug
When navigating to the payloads section from a sub-section of the targets page, the sub-section stays highlighted and is no longer clickable.
To Reproduce
Steps to reproduce the behavior:
- Go to a sub-section of a target.
- Click on Payloads
- Click on the same subsection you just left.
- Section does not change. Stays on pay
1
A Powerful Subdomain Takeover Tool
subdomain
bug-bounty
pentesting
bugbounty
subdomains
takeover
hostile
subdomain-takeover
takeover-subdomain
hostile-subdomain-takeover
-
Updated
Mar 4, 2020 - Go
Collection of small security tools created mostly in Python. CTFs, pentests and so on
python
scanner
static-analysis
hacking
bug-bounty
infosec
pentesting
ctf
bugbounty
ctf-tools
webappsec
security-tools
itsecurity
bug-bounties
security-testing
-
Updated
Mar 8, 2020 - Python
SRCMS企业应急响应与缺陷管理系统
-
Updated
Mar 6, 2020 - JavaScript
Hawkeye filesystem analysis tool
-
Updated
Mar 5, 2020 - Go
xml
hacking
cybersecurity
bug-bounty
infosec
bugbounty
information-security
payload
payloads
cyber-security
websecurity
web-application-security
xxe
xxe-injection
websecurity-reference
xxe-payloads
xxe-example
xml-entity
xxe-payload
xxe-payload-list
-
Updated
Mar 8, 2020
security
bug-bounty
application-security
bugbounty
appsec
payload
payloads
lfi
rfi
web-hacking
websecurity
web-application-security
security-research
security-researcher
lfi-exploitation
payload-list
lfi-vulnerability
security-researchers
rfi-exploiton
rfi-vulnerabillity
-
Updated
Mar 2, 2020
A permutation generation tool written in golang
golang
hacking
bruteforce
bug-bounty
infosec
recon
netsec
subdomains
subdomain-discovery
bruteforce-subdomain
-
Updated
Mar 7, 2020 - Go
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
-
Updated
Mar 8, 2020 - Python
This is a simple tool to automate google hacking when doing web penetration testing or bug hunting.
google
bug-bounty
automated
vulnerability-detection
hacking-tool
google-hacking
google-hacking-database
googledork
hacking-tools
-
Updated
Mar 6, 2020 - Python
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
-
Updated
Feb 19, 2020 - Go
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
-
Updated
Mar 2, 2020
My collection of custom scripts, plugins, exploits and others small things
-
Updated
Mar 5, 2020 - Perl
Credentials Checking Framework
framework
python3
bug-bounty
pentesting
bugbounty
python2
bugcrowd
pentest-scripts
hackerone
pentest-tool
postexplotation
postexploit
-
Updated
Feb 27, 2020 - Python
Simple Server Side Request Forgery services enumeration tool.
-
Updated
Feb 3, 2020 - Ruby
A python script designed to check if the website if vulnerable of clickjacking and create a poc
-
Updated
Mar 1, 2020 - Python
-
Updated
Nov 18, 2019 - Go
Improve this page
Add a description, image, and links to the bug-bounty topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the bug-bounty topic, visit your repo's landing page and select "manage topics."


There should be a first class command to check the api status of a given key, like the current credits. This could be done with a regular script that takes a keypair as input.