A curated list of various bug bounty tools
Recon
Subdomain Enumeration
- Sublist3r – Fast subdomains enumeration tool for penetration testers
- Amass – In-depth Attack Surface Mapping and Asset Discovery
- massdns – A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
- Findomain – The fastest and cross-platform subdomain enumerator, do not waste your time.
- Sudomy – Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
- chaos-client – Go client to communicate with Chaos DNS API.
- domained – Multi Tool Subdomain Enumeration
- bugcrowd-levelup-subdomain-enumeration – This repository contains all the material from the talk “Esoteric sub-domain enumeration techniques” given at Bugcrowd LevelUp 2017 virtual conference
- shuffledns – shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output…
- censys-subdomain-finder – Perform subdomain enumeration using the certificate transparency logs from Censys.
- Turbolist3r – Subdomain enumeration tool with analysis features for discovered domains
- censys-enumeration – A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys
- tugarecon – Fast subdomains enumeration tool for penetration testers.
- as3nt – Another Subdomain ENumeration Tool
- Subra – A Web-UI for subdomain enumeration (subfinder)
- Substr3am – Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued
- domain – enumall.py Setup script for Regon-ng
- altdns – Generates permutations, alterations and mutations of subdomains and then resolves them
- brutesubs – An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose
- dns-parallel-prober – his is a parallelised domain name prober to find as many subdomains of a given domain as fast as possible.
- dnscan – dnscan is a python wordlist-based DNS subdomain scanner.
- knock – Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist.
- hakrevdns – Small, fast tool for performing reverse DNS lookups en masse.
- dnsx – Dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
- subfinder – Subfinder is a subdomain discovery tool that discovers valid subdomains for websites.
- assetfinder – Find domains and subdomains related to a given domain
- crtndstry – Yet another subdomain finder
- VHostScan – A virtual host scanner that performs reverse lookups
- scilla – Information Gathering tool – DNS / Subdomains / Ports / Directories enumeration
- sub3suite – A research-grade suite of tools for subdomain enumeration, intelligence gathering and attack surface mapping.
Port Scanning
- masscan – TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
- RustScan – The Modern Port Scanner
- naabu – A fast port scanner written in go with focus on reliability and simplicity.
- nmap – Nmap – the Network Mapper. Github mirror of official SVN repository.
- sandmap – Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
- ScanCannon – Combines the speed of masscan with the reliability and detailed enumeration of nmap
Screenshots
- EyeWitness – EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- aquatone – Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface.
- screenshoteer – Make website screenshots and mobile emulations from the command line.
- gowitness – gowitness – a golang, web screenshot utility using Chrome Headless
- WitnessMe – Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
- eyeballer – Convolutional neural network for analyzing pentest screenshots
- scrying – A tool for collecting RDP, web and VNC screenshots all in one place
- Depix – Recovers passwords from pixelized screenshots
- httpscreenshot – HTTPScreenshot is a tool for grabbing screenshots and HTML of large numbers of websites.
Technologies
- wappalyzer – Identify technology on websites.
- webanalyze – Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
- python-builtwith – BuiltWith API client
- whatweb – Next generation web scanner
- retire.js – scanner detecting the use of JavaScript libraries with known vulnerabilities
- httpx – httpx is a fast and multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.
Content Discovery
- gobuster – Directory/File, DNS and VHost busting tool written in Go
- recursebuster – rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments
- feroxbuster – A fast, simple, recursive content discovery tool written in Rust.
- dirsearch – Web path scanner
- dirsearch – A Go implementation of dirsearch.
- filebuster – An extremely fast and flexible web fuzzer
- dirstalk – Modern alternative to dirbuster/dirb
- dirbuster-ng – dirbuster-ng is C CLI implementation of the Java dirbuster tool
- gospider – Gospider – Fast web spider written in Go
- hakrawler – Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Links
- LinkFinder – A python script that finds endpoints in JavaScript files
- JS-Scan – a .js scanner, built in php. designed to scrape urls and other info
- LinksDumper – Extract (links/possible endpoints) from responses & filter them via decoding/sorting
- GoLinkFinder – A fast and minimal JS endpoint extractor
- BurpJSLinkFinder – Burp Extension for a passive scanning JS files for endpoint links.
- urlgrab – A golang utility to spider through a website searching for additional links.
- waybackurls – Fetch all the URLs that the Wayback Machine knows about for a domain
- gau – Fetch known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl.
- getJS – A tool to fastly get all javascript sources/files
- linx – Reveals invisible links within JavaScript files
Parameters
- parameth – This tool can be used to brute discover GET and POST parameters
- param-miner – This extension identifies hidden, unlinked parameters. It’s particularly useful for finding web cache poisoning vulnerabilities.
- ParamPamPam – This tool for brute discover GET and POST parameters.
- Arjun – HTTP parameter discovery suite.
- ParamSpider – Mining parameters from dark corners of Web Archives
Fuzzing
- wfuzz – Web application fuzzer
- ffuf – Fast web fuzzer written in Go
- fuzzdb – Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- IntruderPayloads – A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
- fuzz.txt – Potentially dangerous files
- fuzzilli – A JavaScript Engine Fuzzer
- fuzzapi – Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
- qsfuzz – qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
- vaf – very advanced (web) fuzzer written in Nim.
Exploitation
Command Injection
- commix – Automated All-in-One OS command injection and exploitation tool.
CORS Misconfiguration
- Corsy – CORS Misconfiguration Scanner
- CORStest – A simple CORS misconfiguration scanner
- cors-scanner – A multi-threaded scanner that helps identify CORS flaws/misconfigurations
- CorsMe – Cross Origin Resource Sharing MisConfiguration Scanner
CRLF Injection
- CRLFsuite – A fast tool specially designed to scan CRLF injection
- crlfuzz – A fast tool to scan CRLF vulnerability written in Go
- CRLF-Injection-Scanner – Command line tool for testing CRLF injection on a list of domains.
- Injectus – CRLF and open redirect fuzzer
CSRF Injection
- XSRFProbe -The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
Directory Traversal
- dotdotpwn – DotDotPwn – The Directory Traversal Fuzzer
- FDsploit – File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
- off-by-slash – Burp extension to detect alias traversal via NGINX misconfiguration at scale.
- liffier – tired of manually add dot-dot-slash to your possible path traversal? this short snippet will increment ../ on the URL.
File Inclusion
- liffy – Local file inclusion exploitation tool
- Burp-LFI-tests – Fuzzing for LFI using Burpsuite
- LFI-Enum – Scripts to execute enumeration via LFI
- LFISuite – Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
- LFI-files – Wordlist to bruteforce for LFI
GraphQL Injection
- inql – InQL – A Burp Extension for GraphQL Security Testing
- GraphQLmap – GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
- shapeshifter – GraphQL security testing tool
- graphql_beautifier – Burp Suite extension to help make Graphql request more readable
- clairvoyance – Obtain GraphQL API schema despite disabled introspection!
Header Injection
- headi – Customisable and automated HTTP header injection.
Insecure Deserialization
- ysoserial – A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
- GadgetProbe – Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
- ysoserial.net – Deserialization payload generator for a variety of .NET formatters
- phpggc – PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
Insecure Direct Object References
- Autorize – Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily
Open Redirect
- Oralyzer – Open Redirection Analyzer
- Injectus – CRLF and open redirect fuzzer
- dom-red – Small script to check a list of domains against open redirect vulnerability
- OpenRedireX – A Fuzzer for OpenRedirect issues
Race Condition
- razzer – A Kernel fuzzer focusing on race bugs
- racepwn – Race Condition framework
- requests-racer – Small Python library that makes it easy to exploit race conditions in web apps with Requests.
- turbo-intruder – Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.
- race-the-web – Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.
Request Smuggling
- http-request-smuggling – HTTP Request Smuggling Detection Tool
- smuggler – Smuggler – An HTTP Request Smuggling / Desync testing tool written in Python 3
- h2csmuggler – HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
- tiscripts – These scripts I use to create Request Smuggling Desync payloads for CLTE and TECL style attacks.
Server Side Request Forgery
- SSRFmap – Automatic SSRF fuzzer and exploitation tool
- Gopherus – This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
- ground-control – A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
- SSRFire – An automated SSRF finder. Just give the domain name and your server and chill! 😉 Also has options to find XSS and open redirects
- httprebind – Automatic tool for DNS rebinding-based SSRF attacks
- ssrf-sheriff – A simple SSRF-testing sheriff written in Go
- B-XSSRF – Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- extended-ssrf-search – Smart ssrf scanner using different methods like parameter brute forcing in post and get…
- gaussrf – Fetch known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SSRF Parameters.
- ssrfDetector – Server-side request forgery detector
- grafana-ssrf – Authenticated SSRF in Grafana
- sentrySSRF – Tool to searching sentry config on page or in javascript files and check blind SSRF
- lorsrf – Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods
- singularity – A DNS rebinding attack framework.
- whonow – A “malicious” DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
- dns-rebind-toolkit – A front-end JavaScript toolkit for creating DNS rebinding attacks.
- dref – DNS Rebinding Exploitation Framework
- rbndr – Simple DNS Rebinding Service
- httprebind – Automatic tool for DNS rebinding-based SSRF attacks
- [dnsFookup](DNS rebinding toolkit) – https://github.com/makuga01/dnsFookup
SQL Injection
- sqlmap – Automatic SQL injection and database takeover tool
- NoSQLMap – Automated NoSQL database enumeration and web application exploitation tool.
- SQLiScanner – Automatic SQL injection with Charles and sqlmap api
- SleuthQL – Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.
- mssqlproxy – mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
- sqli-hunter – SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
- waybackSqliScanner – Gather urls from wayback machine then test each GET parameter for sql injection.
- ESC – Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features.
- mssqli-duet – SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
- burp-to-sqlmap – Performing SQLInjection test on Burp Suite Bulk Requests using SQLMap
- BurpSQLTruncSanner – Messy BurpSuite plugin for SQL Truncation vulnerabilities.
- andor – Blind SQL Injection Tool with Golang
- Blinder – A python library to automate time-based blind SQL injection
- sqliv – massive SQL injection vulnerability scanner
- nosqli – NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.
XSS Injection
- XSStrike – Most advanced XSS scanner.
- xssor2 – XSS’OR – Hack with JavaScript.
- xsscrapy – XSS spider – 66/66 wavsep XSS detected
- sleepy-puppy – Sleepy Puppy XSS Payload Management Framework
- ezXSS – ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
- xsshunter – The XSS Hunter service – a portable version of XSSHunter.com
- dalfox – DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
- xsser – Cross Site “Scripter” (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
- XSpear – Powerfull XSS Scanning and Parameter analysis tool&gem
- weaponised-XSS-payloads – XSS payloads designed to turn alert(1) into P1
- tracy – A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
- ground-control – A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
- xssValidator – This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.
- JSShell – An interactive multi-user web JS shell
- bXSS – bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
- docem – Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)
- XSS-Radar – XSS Radar is a tool that detects parameters and fuzzes them for cross-site scripting vulnerabilities.
- BruteXSS – BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application.
- findom-xss – A fast DOM based XSS vulnerability scanner with simplicity.
- domdig – DOM XSS scanner for Single Page Applications
- femida – Automated blind-xss search for Burp Suite
- B-XSSRF – Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- domxssscanner – DOMXSS Scanner is an online tool to scan source code for DOM based XSS vulnerabilities
- xsshunter_client – Correlated injection proxy tool for XSS Hunter
- extended-xss-search – A better version of my xssfinder tool – scans for different types of xss on a list of urls.
- xssmap – XSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
- XSSCon – XSSCon: Simple XSS Scanner tool
- BitBlinder – BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities
- XSSOauthPersistence – Maintaining account persistence via XSS and Oauth
- shadow-workers – Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
- rexsser – This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.
- xss-flare – XSS hunter on cloudflare serverless workers.
- Xss-Sql-Fuzz – burpsuite 插件对GP所有参数(过滤特殊参数)一键自动添加xss sql payload 进行fuzz
- vaya-ciego-nen – Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
- dom-based-xss-finder – Chrome extension that finds DOM based XSS vulnerabilities
- XSSTerminal – Develop your own XSS Payload using interactive typing
- xss2png – PNG IDAT chunks XSS payload generator
- XSSwagger – A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks
XXE Injection
- ground-control – A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
- dtd-finder – List DTDs and generate XXE payloads using those local DTDs.
- docem – Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)
- xxeserv – A mini webserver with FTP support for XXE payloads
- xxexploiter – Tool to help exploit XXE vulnerabilities
- B-XSSRF – Toolkit to detect and keep track on Blind XSS, XXE & SSRF
- XXEinjector – Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
- oxml_xxe – A tool for embedding XXE/XML exploits into different filetypes
- metahttp – A bash script that automates the scanning of a target network for HTTP resources through XXE
Miscellaneous
Passwords
- thc-hydra – Hydra is a parallelized login cracker which supports numerous protocols to attack.
- DefaultCreds-cheat-sheet – One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
- changeme – A default credential scanner.
- BruteX – Automatically brute force all services running on a target.
- patator – Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Secrets
- git-secrets – Prevents you from committing secrets and credentials into git repositories
- gitleaks – Scan git repos (or files) for secrets using regex and entropy
- truffleHog – Searches through git repositories for high entropy strings and secrets, digging deep into commit history
- gitGraber – gitGraber: monitor GitHub to search and find sensitive data in real time for different online services
- talisman – By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious – such as authorization tokens and private keys.
- GitGot – Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
- git-all-secrets – A tool to capture all the git secrets by leveraging multiple open source git searching tools
- github-search – Tools to perform basic search on GitHub.
- git-vuln-finder – Finding potential software vulnerabilities from git commit messages
- commit-stream – #OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API
- gitrob – Reconnaissance tool for GitHub organizations
- repo-supervisor – Scan your code for security misconfiguration, search for passwords and secrets.
- GitMiner – Tool for advanced mining for content on Github
- shhgit – Ah shhgit! Find GitHub secrets in real time
- detect-secrets – An enterprise friendly way of detecting and preventing secrets in code.
- rusty-hog – A suite of secret scanners built in Rust for performance. Based on TruffleHog
- whispers – Identify hardcoded secrets and dangerous behaviours
- yar – Yar is a tool for plunderin’ organizations, users and/or repositories.
- dufflebag – Search exposed EBS volumes for secrets
- secret-bridge – Monitors Github for leaked secrets
- earlybird – EarlyBird is a sensitive data detection tool capable of scanning source code repositories for clear text password violations, PII, outdated cryptography methods, key files and more.
- Trufflehog-Chrome-Extension – Trufflehog-Chrome-Extension
Git
- GitTools – A repository with 3 tools for pwn’ing websites with .git repositories available
- gitjacker – Leak git repositories from misconfigured websites
- git-dumper – A tool to dump a git repository from a website
- GitHunter – A tool for searching a Git repository for interesting content
- dvcs-ripper – Rip web accessible (distributed) version control systems: SVN/GIT/HG…
Buckets
- S3Scanner – Scan for open AWS S3 buckets and dump the contents
- AWSBucketDump – Security Tool to Look For Interesting Files in S3 Buckets
- CloudScraper – CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
- s3viewer – Publicly Open Amazon AWS S3 Bucket Viewer
- festin – FestIn – S3 Bucket Weakness Discovery
- s3reverse – The format of various s3 buckets is convert in one format. for bugbounty and security testing.
- mass-s3-bucket-tester – This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable
- S3BucketList – Firefox plugin that lists Amazon S3 Buckets found in requests
- dirlstr – Finds Directory Listings or open S3 buckets from a list of URLs
- Burp-AnonymousCloud – Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities
- kicks3 – S3 bucket finder from html,js and bucket misconfiguration testing tool
- 2tearsinabucket – Enumerate s3 buckets for a specific target.
- s3_objects_check – Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.
- s3tk – A security toolkit for Amazon S3
- CloudBrute – Awesome cloud enumerator
- s3cario – This tool will get the CNAME first if it’s a valid Amazon s3 bucket and if it’s not, it will try to check if the domain is a bucket name.
- S3Cruze – All-in-one AWS S3 bucket tool for pentesters.
CMS
- wpscan – WPScan is a free, for non-commercial use, black box WordPress security scanner
- WPSpider – A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.
- wprecon – WordPress Recon
- CMSmap – CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
- joomscan – OWASP Joomla Vulnerability Scanner Project
- pyfiscan – Free web-application vulnerability and version scanner
JSON Web Token
- jwt_tool – A toolkit for testing, tweaking and cracking JSON Web Tokens
- c-jwt-cracker – JWT brute force cracker written in C
- jwt-heartbreaker – The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources
- jwtear – Modular command-line tool to parse, create and manipulate JWT tokens for hackers
- jwt-key-id-injector – Simple python script to check against hypothetical JWT vulnerability.
- jwt-hack – jwt-hack is tool for hacking / security testing to JWT.
- jwt-cracker – Simple HS256 JWT token brute force cracker
postMessage
- postMessage-tracker – A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon
- PostMessage_Fuzz_Tool – #BugBounty #BugBounty Tools #WebDeveloper Tool
Subdomain Takeover
- subjack – Subdomain Takeover tool written in Go
- SubOver – A Powerful Subdomain Takeover Tool
- autoSubTakeover – A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking out if subdomain takeover is possible.
- NSBrute – Python utility to takeover domains vulnerable to AWS NS Takeover
- can-i-take-over-xyz – “Can I take over XYZ?” — a list of services and how to claim (sub)domains with dangling DNS records.
- cnames – take a list of resolved subdomains and output any corresponding CNAMES en masse.
- subHijack – Hijacking forgotten & misconfigured subdomains
- tko-subs – A tool that can help detect and takeover subdomains with dead DNS records
- HostileSubBruteforcer – This app will bruteforce for exisiting subdomains and provide information if the 3rd party host has been properly setup.
- second-order – Second-order subdomain takeover scanner
- takeover – A tool for testing subdomain takeover possibilities at a mass scale.
Vulnerability Scanners
- nuclei – Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
- Sn1per – Automated pentest framework for offensive security experts
- metasploit-framework – Metasploit Framework
- nikto – Nikto web server scanner
- arachni – Web Application Security Scanner Framework
- jaeles – The Swiss Army knife for automated Web Application Testing
- retire.js – scanner detecting the use of JavaScript libraries with known vulnerabilities
- Osmedeus – Fully automated offensive security framework for reconnaissance and vulnerability scanning
- getsploit – Command line utility for searching and downloading exploits
- flan – A pretty sweet vulnerability scanner
- Findsploit – Find exploits in local and online databases instantly
- BlackWidow – A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
- backslash-powered-scanner – Finds unknown classes of injection vulnerabilities
- Eagle – Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
- cariddi – Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more…
Uncategorized
- JSONBee – A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
- CyberChef – The Cyber Swiss Army Knife – a web app for encryption, encoding, compression and data analysis
- –
- bountyplz – Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
- PayloadsAllTheThings – A list of useful payloads and bypass for Web Application Security and Pentest/CTF
- bounty-targets-data – This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
- android-security-awesome – A collection of android security related resources
- awesome-mobile-security – An effort to build a single place for all useful android and iOS security related stuff.
- awesome-vulnerable-apps – Awesome Vulnerable Applications
- XFFenum – X-Forwarded-For [403 forbidden] enumeration
- httpx – httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.
The Bug Bounty Tools is a github repository by Kamil Vavra
Leave a Reply