an Automation for Hunters
-
Updated
Jun 12, 2024 - HTML
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
an Automation for Hunters
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
[Automated | UpToDate] Daily Dumps of CertStream Certificate Logs Subdomains Data (SAN || CN)
🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), GitHub, Facebook (Meta), OpenAI (GPTBot) and other with daily updates.
This repository is dedicated to showcasing a collection of educational videos curated with gratitude for Defronix and my mentor Mr. Nitesh Singh. The content available here features a series of insightful tutorials and discussions on various topics related to cybersecurity.
Asset inventory of over 800 public bug bounty programs.
Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Collection of multiple cyber security notes. Notes include vulnerabilities, techniques, tools, site and other stuff.
[Custom || Automated] Curation & Collection of BugBounty Wordlists
📦 1000+ Statically Linked Binaries & Build Scripts for Android (arm64-v8a), Linux (aarch64 | x86-64), Windows (AMD64) :: https://bin.ajam.dev
subActive is a powerful bash script for active subdomain enumeration, using multiple tools to discover subdomains for specified domains. It performs DNS bruteforcing, permutation generation, web probing, and other tasks, providing a comprehensive subdomain discovery solution for cybersecurity professionals.
Precon is a versatile subdomain discovery tool that automates passive reconnaissance by leveraging multiple tools. Ideal for cybersecurity professionals, it simplifies the process of identifying subdomains, enhancing the efficiency of web application security assessments.
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties
Real-world infosec wordlists, updated regularly
A high-performance tool for identifying domain takeovers with support for custom fingerprints and resolver lists.
Fuzz 401/403/404 pages for bypasses
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more