Stars
Burp Plugin to Bypass WAFs through the insertion of Junk Data
The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!
A Burp Suite Extension for parsing Project Files from the CLI.
🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet
InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
Magisk module that adds the Burp certificate to the system's root CA store
☁️ Bash history in the cloud. Indexed and searchable.
hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.
jekkos / cpupower
Forked from deinstapel/cpupowerManage the frequency scaling driver of your CPU (Intel Core and AMD Ryzen processors supported)
A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search queries.
Swisscom Vulnerability Disclosure Policy & Bug Bounty Programme
Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws
Self-hosted bug bounty programs that are "scammy" or unethical
Fast and customizable subdomain wordlist generator using DSL
Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces
Top disclosed reports from HackerOne
Collection of methodology and test case for various web vulnerabilities.
Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.
Automatic SQL injection and database takeover tool