This repo contains resources for bug bounty hunting.
-
Updated
May 15, 2023 - HTML
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
This repo contains resources for bug bounty hunting.
Bug bounty reports generator
Hi, I’m Karan Vaniya, known in cybersecurity as Bitex (b1t3x0p). I’m an ethical hacker and bug bounty hunter, skilled in discovering hidden security flaws and protecting critical systems. I’ve earned a place in NASA’s Hall of Fame and am an Indian Book of Records holder
A Python Web App For IDOR Vulnerability Practices and Learning Purpose
AltDns Generator.js Is An Application That Generates & Resolves Dynamic DNS Wildcards
A browser-based, single-file tool to visually parse, filter, sort, and explore HTTPx JSON output. This enhanced version provides a more refined UI and advanced features for efficient analysis of web scan results.
Bug Hunting Toolkit v2.0
📜 tool offline en el navegador para organizar, filtrar y abrir informes de bug bounty. permite crear categorías, añadir notas, asignar prioridades y gestionar urls con persistencia en localstorage.
📜 Bug Bounty Arsenal es un repositorio que concentra en un solo lugar todo lo necesario para la caza de vulnerabilidades web: metodologías de expertos, estándares internacionales, técnicas avanzadas de recon, bypass de WAF, explotación y plantillas de informes.
Simple Web app in Flask and Bootstrap for BugBounty Information sharing.
The is a online Clickjacking Proof of Concept (PoC) tool that allows you to test websites for clickjacking vulnerability.
Is an application for convenient work with google dorks . It is designed to help users create and share their google dorks with each other.
A directory traversal tool for discovering injection paths
Unpacked DOM Invader Chrome extension for easy installation and use outside Burp Suite empowering bug bounty hunters and web security researchers.
📜 Métodos HTTP Aceptados y Header — Catálogo interactivo y buscador de métodos HTTP (GET…MKCOL) para developers y pentesters.
Real-world web vulnerability reports including SQL Injection (SQLi), Cross-Site Scripting (XSS), CSRF, and session hijacking. Created in HTML & CSS for professional documentation.
A practical tool to track and manage web app security tests.
A powerful web-based tool for advanced Google search queries and subdomain discovery, designed specifically for cybersecurity research and bug bounty hunting. Perfect for discovering hidden parameters, endpoints, and sensitive information during security assessments.
Real-world web vulnerability reports including SQL Injection (SQLi), Cross-Site Scripting (XSS), CSRF, and session hijacking. Created in HTML & CSS for professional documentation.