Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 814

✨Bug Bounty tools - Ultimate list✨

by the1optimus - 19 January, 2023 - 02:37 PM
This post is by a banned member (the1optimus) - Unhide
581
Posts
121
Threads
5 Years of service
#1
If you practice the wonderful discipline of Bug Bounty, you probably already have a handy toolbox.

But if you're just starting out, the good news is that ethical hacker Kamil Vavra has compiled an "Awesome List" like only Github can host.

This list contains all the tools to recognize subdomains, technologies, ports...etc. and also exploitation such as command injection, SQL injection, XSS, XXE, File Inclusion...etc.

You'll have hours to look at and test all this and I think it will save you a lot of time.

To be discovered here:

Hidden Content
You must register or login to view this content.



Leave a like if this post helps you
This post is by a banned member (columbus321) - Unhide
This post is by a banned member (Kebabit) - Unhide
This post is by a banned member (jVGW3aswZd) - Unhide
25
Posts
0
Threads
1 Year of service
#4
does this really work?
This post is by a banned member (jfduih) - Unhide
jfduih  
Registered
52
Posts
0
Threads
2 Years of service
#5
Gcncc
This post is by a banned member (jfduih) - Unhide
jfduih  
Registered
52
Posts
0
Threads
2 Years of service
#6
Mad it
This post is by a banned member (Cypher5) - Unhide
Cypher5  
Registered
172
Posts
0
Threads
3 Years of service
#7
thanks for the tools
This post is by a banned member (jlkfss) - Unhide
jlkfss  
Registered
9
Posts
0
Threads
1 Year of service
#8
(19 January, 2023 - 02:37 PM)the1optimus Wrote: Show More
If you practice the wonderful discipline of Bug Bounty, you probably already have a handy toolbox.

But if you're just starting out, the good news is that ethical hacker Kamil Vavra has compiled an "Awesome List" like only Github can host.

This list contains all the tools to recognize subdomains, technologies, ports...etc. and also exploitation such as command injection, SQL injection, XSS, XXE, File Inclusion...etc.

You'll have hours to look at and test all this and I think it will save you a lot of time.

To be discovered here:


Leave a like if this post helps you

thanks

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)