A curated list of various bug bounty tools | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

A curated list of various bug bounty tools

A curated list of various bug bounty tools

LV
0
 

SnifferSL

Member
Joined
Apr 10, 2024
Threads
1
Likes
1
Awards
1
Credits
281©
Cash
0$
Contents

  • Recon
  • Subdomain Enumeration
  • Port Scanning
  • Screenshots
  • Technologies
  • Content Discovery
  • Links
  • Parameters
  • Fuzzing
  • Exploitation
  • Command Injection
  • CORS Misconfiguration
  • CRLF Injection
  • CSRF Injection
  • Directory Traversal
  • File Inclusion
  • GraphQL Injection
  • Header Injection
  • Insecure Deserialization
  • Insecure Direct Object References
  • Open Redirect
  • Race Condition
  • Request Smuggling
  • Server Side Request Forgery
  • SQL Injection
  • XSS Injection
  • XXE Injection
  • Miscellaneous
  • Passwords
  • Secrets
  • Git
  • Buckets
  • CMS
  • JSON Web Token
  • postMessage
  • Subdomain Takeover
  • Uncategorized

Recon​

Lorem ipsum dolor sit amet

Subdomain Enumeration​

  • Sublist3r 2 — Fast subdomains enumeration tool for penetration testers
  • Amass — In-depth Attack Surface Mapping and Asset Discovery
  • massdns 1 — A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
  • Findomain 2 — The fastest and cross-platform subdomain enumerator, do not waste your time.
  • Sudomy — Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
  • chaos-client — Go client to communicate with Chaos DNS API.
  • domained — Multi Tool Subdomain Enumeration
  • bugcrowd-levelup-subdomain-enumeration — This repository contains all the material from the talk “Esoteric sub-domain enumeration techniques” given at Bugcrowd LevelUp 2017 virtual conference
  • shuffledns — shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output…
  • censys-subdomain-finder — Perform subdomain enumeration using the certificate transparency logs from Censys.
  • Turbolist3r 1 — Subdomain enumeration tool with analysis features for discovered domains
  • censys-enumeration 1 — A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys
  • tugarecon — Fast subdomains enumeration tool for penetration testers.
  • as3nt — Another Subdomain ENumeration Tool
  • Subra 1 — A Web-UI for subdomain enumeration (subfinder)
  • Substr3am — Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued
  • domain — enumall.py Setup script for Regon-ng
  • altdns — Generates permutations, alterations and mutations of subdomains and then resolves them
  • brutesubs 1 — An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose
  • dns-parallel-prober — his is a parallelised domain name prober to find as many subdomains of a given domain as fast as possible.
  • dnscan 1 — dnscan is a python wordlist-based DNS subdomain scanner.
  • knock — Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist.
  • hakrevdns — Small, fast tool for performing reverse DNS lookups en masse.
  • dnsx — Dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
  • subfinder 1 — Subfinder is a subdomain discovery tool that discovers valid subdomains for websites.
  • assetfinder — Find domains and subdomains related to a given domain
  • crtndstry 1 — Yet another subdomain finder
  • VHostScan 1 — A virtual host scanner that performs reverse lookups
  • scilla — Information Gathering tool — DNS / Subdomains / Ports / Directories enumeration

Port Scanning​

  • masscan — TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
  • RustScan 1 — The Modern Port Scanner
  • naabu 1 — A fast port scanner written in go with focus on reliability and simplicity.
  • nmap — Nmap — the Network Mapper. Github mirror of official SVN repository.
  • sandmap — Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
  • ScanCannon — Combines the speed of masscan with the reliability and detailed enumeration of nmap

Screenshots​

  • EyeWitness 2 — EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
  • aquatone — Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface.
  • screenshoteer — Make website screenshots and mobile emulations from the command line.
  • gowitness — gowitness — a golang, web screenshot utility using Chrome Headless
  • WitnessMe — Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
  • eyeballer — Convolutional neural network for analyzing pentest screenshots
  • scrying — A tool for collecting RDP, web and VNC screenshots all in one place
  • Depix — Recovers passwords from pixelized screenshots
  • httpscreenshot — HTTPScreenshot is a tool for grabbing screenshots and HTML of large numbers of websites.

Technologies​

  • wappalyzer 3 — Identify technology on websites.
  • webanalyze 1 — Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.
  • python-builtwith — BuiltWith API client
  • whatweb — Next generation web scanner
  • retire.js 2 — scanner detecting the use of JavaScript libraries with known vulnerabilities

Content Discovery​

  • gobuster — Directory/File, DNS and VHost busting tool written in Go
  • recursebuster — rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments
  • feroxbuster — A fast, simple, recursive content discovery tool written in Rust.
  • dirsearch — Web path scanner
  • dirsearch — A Go implementation of dirsearch.
  • filebuster — An extremely fast and flexible web fuzzer
  • dirstalk — Modern alternative to dirbuster/dirb
  • dirbuster-ng — dirbuster-ng is C CLI implementation of the Java dirbuster tool
  • gospider — Gospider — Fast web spider written in Go
  • hakrawler — Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
  • LinkFinder 1 — A python script that finds endpoints in JavaScript files
  • JS-Scan — a .js scanner, built in php. designed to scrape urls and other info
  • LinksDumper — Extract (links/possible endpoints) from responses & filter them via decoding/sorting
  • GoLinkFinder — A fast and minimal JS endpoint extractor
  • BurpJSLinkFinder — Burp Extension for a passive scanning JS files for endpoint links.
  • urlgrab — A golang utility to spider through a website searching for additional links.
  • waybackurls — Fetch all the URLs that the Wayback Machine knows about for a domain
  • gau — Fetch known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl.
  • getJS 1 — A tool to fastly get all javascript sources/files

Parameters​

  • parameth 1 — This tool can be used to brute discover GET and POST parameters
  • param-miner — This extension identifies hidden, unlinked parameters. It’s particularly useful for finding web cache poisoning vulnerabilities.
  • ParamPamPam — This tool for brute discover GET and POST parameters.
  • Arjun — HTTP parameter discovery suite.
  • ParamSpider — Mining parameters from dark corners of Web Archives

Fuzzing​

  • wfuzz — Web application fuzzer
  • ffuf — Fast web fuzzer written in Go
  • fuzzdb — Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
  • IntruderPayloads — A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
  • fuzz.txt 1 — Potentially dangerous files
  • fuzzilli — A JavaScript Engine Fuzzer
  • fuzzapi — Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
  • qsfuzz — qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.

Exploitation​

Lorem ipsum dolor sit amet

Command Injection​

  • commix 1 — Automated All-in-One OS command injection and exploitation tool.

CORS Misconfiguration​

  • Corsy 1 — CORS Misconfiguration Scanner
  • CORStest — A simple CORS misconfiguration scanner
  • cors-scanner — A multi-threaded scanner that helps identify CORS flaws/misconfigurations
  • CorsMe — Cross Origin Resource Sharing MisConfiguration Scanner

CRLF Injection​

  • crlfuzz — A fast tool to scan CRLF vulnerability written in Go
  • CRLF-Injection-Scanner — Command line tool for testing CRLF injection on a list of domains.
  • Injectus 1 — CRLF and open redirect fuzzer

CSRF Injection​

  • XSRFProbe 2 -The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.

Directory Traversal​

  • dotdotpwn 1 — DotDotPwn — The Directory Traversal Fuzzer
  • FDsploit 1 — File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
  • off-by-slash — Burp extension to detect alias traversal via NGINX misconfiguration at scale.
  • liffier — tired of manually add dot-dot-slash to your possible path traversal? this short snippet will increment …/ on the URL.

File Inclusion​

  • liffy — Local file inclusion exploitation tool
  • Burp-LFI-tests — Fuzzing for LFI using Burpsuite
  • LFI-Enum — Scripts to execute enumeration via LFI
  • LFISuite — Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
  • LFI-files 1 — Wordlist to bruteforce for LFI

GraphQL Injection​

  • inql — InQL — A Burp Extension for GraphQL Security Testing
  • GraphQLmap — GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.
  • shapeshifter 1 — GraphQL security testing tool
  • graphql_beautifier — Burp Suite extension to help make Graphql request more readable
  • clairvoyance — Obtain GraphQL API schema despite disabled introspection!

Header Injection​

  • headi 1 — Customisable and automated HTTP header injection.

Insecure Deserialization​

  • ysoserial — A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
  • GadgetProbe — Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
  • ysoserial.net — Deserialization payload generator for a variety of .NET formatters
  • phpggc — PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.

Insecure Direct Object References​

  • Autorize — Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily

Open Redirect​

  • Oralyzer — Open Redirection Analyzer
  • Injectus 1 — CRLF and open redirect fuzzer
  • dom-red — Small script to check a list of domains against open redirect vulnerability
  • gen.py — Open url redirect payload generator
  • OpenRedireX — A Fuzzer for OpenRedirect issues

Race Condition​

  • razzer — A Kernel fuzzer focusing on race bugs
  • racepwn — Race Condition framework
  • requests-racer — Small Python library that makes it easy to exploit race conditions in web apps with Requests.
  • turbo-intruder — Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.
  • race-the-web — Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.

Request Smuggling​

  • http-request-smuggling 1 — HTTP Request Smuggling Detection Tool
  • smuggler — Smuggler — An HTTP Request Smuggling / Desync testing tool written in Python 3
  • h2csmuggler — HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
  • tiscripts 1 — These scripts I use to create Request Smuggling Desync payloads for CLTE and TECL style attacks.

Server Side Request Forgery​

  • SSRFmap — Automatic SSRF fuzzer and exploitation tool
  • Gopherus — This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
  • ground-control — A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
  • SSRFire — An automated SSRF finder. Just give the domain name and your server and chill!
07Gl8abOPU4i92LYI

  • Also has options to find XSS and open redirects
  • httprebind — Automatic tool for DNS rebinding-based SSRF attacks
  • ssrf-sheriff — A simple SSRF-testing sheriff written in Go
  • B-XSSRF — Toolkit to detect and keep track on Blind XSS, XXE & SSRF
  • extended-ssrf-search — Smart ssrf scanner using different methods like parameter brute forcing in post and get…
  • gaussrf — Fetch known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SSRF Parameters.
  • ssrfDetector — Server-side request forgery detector
  • grafana-ssrf — Authenticated SSRF in Grafana
  • sentrySSRF — Tool to searching sentry config on page or in javascript files and check blind SSRF
  • lorsrf — Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods
  • singularity — A DNS rebinding attack framework.
  • whonow — A “malicious” DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
  • dns-rebind-toolkit — A front-end JavaScript toolkit for creating DNS rebinding attacks.
  • dref — DNS Rebinding Exploitation Framework
  • rbndr — Simple DNS Rebinding Service
  • httprebind — Automatic tool for DNS rebinding-based SSRF attacks
  • [dnsFookup](DNS rebinding toolkit) — https://github.com/makuga01/dnsFookup 1

SQL Injection​

  • sqlmap 2 — Automatic SQL injection and database takeover tool
  • NoSQLMap — Automated NoSQL database enumeration and web application exploitation tool.
  • SQLiScanner — Automatic SQL injection with Charles and sqlmap api
  • SleuthQL — Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.
  • mssqlproxy — mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
  • sqli-hunter — SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
  • waybackSqliScanner 1 — Gather urls from wayback machine then test each GET parameter for sql injection.
  • ESC — Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features.
  • mssqli-duet — SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing
  • burp-to-sqlmap — Performing SQLInjection test on Burp Suite Bulk Requests using SQLMap
  • BurpSQLTruncSanner — Messy BurpSuite plugin for SQL Truncation vulnerabilities.
  • andor — Blind SQL Injection Tool with Golang
  • Blinder — A python library to automate time-based blind SQL injection
  • sqliv — massive SQL injection vulnerability scanner
  • nosqli — NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.

XSS Injection​

  • XSStrike — Most advanced XSS scanner.
  • xssor2 1 — XSS’OR — Hack with JavaScript.
  • xsscrapy — XSS spider — 66/66 wavsep XSS detected
  • sleepy-puppy — Sleepy Puppy XSS Payload Management Framework
  • ezXSS — ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
  • xsshunter — The XSS Hunter service — a portable version of XSSHunter.com
  • dalfox — DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
  • xsser — Cross Site “Scripter” (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
  • XSpear — Powerfull XSS Scanning and Parameter analysis tool&gem
  • weaponised-XSS-payloads — XSS payloads designed to turn alert(1) into P1
  • tracy — A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
  • ground-control — A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
  • xssValidator — This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.
  • JSShell — An interactive multi-user web JS shell
  • bXSS — bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
  • docem — Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)
  • XSS-Radar — XSS Radar is a tool that detects parameters and fuzzes them for cross-site scripting vulnerabilities.
  • BruteXSS — BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application.
  • findom-xss — A fast DOM based XSS vulnerability scanner with simplicity.
  • domdig — DOM XSS scanner for Single Page Applications
  • femida — Automated blind-xss search for Burp Suite
  • B-XSSRF — Toolkit to detect and keep track on Blind XSS, XXE & SSRF
  • domxssscanner — DOMXSS Scanner is an online tool to scan source code for DOM based XSS vulnerabilities
  • xsshunter_client — Correlated injection proxy tool for XSS Hunter
  • extended-xss-search — A better version of my xssfinder tool — scans for different types of xss on a list of urls.
  • xssmap — XSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具
  • XSSCon — XSSCon: Simple XSS Scanner tool
  • BitBlinder — BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities
  • XSSOauthPersistence — Maintaining account persistence via XSS and Oauth
  • shadow-workers — Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
  • rexsser — This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.
  • xss-flare — XSS hunter on cloudflare serverless workers.
  • Xss-Sql-Fuzz — burpsuite 插件对GP所有参数(过滤特殊参数)一键自动添加xss sql payload 进行fuzz
  • vaya-ciego-nen — Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
  • dom-based-xss-finder — Chrome extension that finds DOM based XSS vulnerabilities
  • XSSTerminal — Develop your own XSS Payload using interactive typing
  • xss2png — PNG IDAT chunks XSS payload generator
  • XSSwagger — A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks

XXE Injection​

  • ground-control — A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.
  • dtd-finder — List DTDs and generate XXE payloads using those local DTDs.
  • docem — Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)
  • xxeserv — A mini webserver with FTP support for XXE payloads
  • xxexploiter — Tool to help exploit XXE vulnerabilities
  • B-XSSRF — Toolkit to detect and keep track on Blind XSS, XXE & SSRF
  • XXEinjector — Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.
  • oxml_xxe — A tool for embedding XXE/XML exploits into different filetypes
  • metahttp — A bash script that automates the scanning of a target network for HTTP resources through XXE

Miscellaneous​

Lorem ipsum dolor sit amet

Passwords​

  • thc-hydra — Hydra is a parallelized login cracker which supports numerous protocols to attack.
  • DefaultCreds-cheat-sheet 1 — One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
  • changeme — A default credential scanner.
  • BruteX — Automatically brute force all services running on a target.
  • patator — Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Secrets​

  • git-secrets — Prevents you from committing secrets and credentials into git repositories
  • gitleaks — Scan git repos (or files) for secrets using regex and entropy
  • truffleHog — Searches through git repositories for high entropy strings and secrets, digging deep into commit history
  • gitGraber — gitGraber: monitor GitHub to search and find sensitive data in real time for different online services
  • talisman — By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious — such as authorization tokens and private keys.
  • GitGot — Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
  • git-all-secrets 1 — A tool to capture all the git secrets by leveraging multiple open source git searching tools
  • github-search — Tools to perform basic search on GitHub.
  • git-vuln-finder — Finding potential software vulnerabilities from git commit messages
  • commit-stream — #OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API
  • gitrob — Reconnaissance tool for GitHub organizations
  • repo-supervisor — Scan your code for security misconfiguration, search for passwords and secrets.
  • GitMiner — Tool for advanced mining for content on Github
  • shhgit 1 — Ah shhgit! Find GitHub secrets in real time
  • detect-secrets — An enterprise friendly way of detecting and preventing secrets in code.
  • rusty-hog — A suite of secret scanners built in Rust for performance. Based on TruffleHog
  • whispers — Identify hardcoded secrets and dangerous behaviours
  • yar — Yar is a tool for plunderin’ organizations, users and/or repositories.
  • dufflebag — Search exposed EBS volumes for secrets
  • secret-bridge — Monitors Github for leaked secrets
  • earlybird — EarlyBird is a sensitive data detection tool capable of scanning source code repositories for clear text password violations, PII, outdated cryptography methods, key files and more.

Git​

  • GitTools — A repository with 3 tools for pwn’ing websites with .git repositories available
  • gitjacker — Leak git repositories from misconfigured websites
  • git-dumper 1 — A tool to dump a git repository from a website
  • GitHunter — A tool for searching a Git repository for interesting content
  • dvcs-ripper 1 — Rip web accessible (distributed) version control systems: SVN/GIT/HG…

Buckets​

  • S3Scanner — Scan for open AWS S3 buckets and dump the contents
  • AWSBucketDump — Security Tool to Look For Interesting Files in S3 Buckets
  • CloudScraper — CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.
  • s3viewer — Publicly Open Amazon AWS S3 Bucket Viewer
  • festin — FestIn — S3 Bucket Weakness Discovery
  • s3reverse — The format of various s3 buckets is convert in one format. for bugbounty and security testing.
  • mass-s3-bucket-tester — This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable
  • S3BucketList — Firefox plugin that lists Amazon S3 Buckets found in requests
  • dirlstr — Finds Directory Listings or open S3 buckets from a list of URLs
  • Burp-AnonymousCloud — Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities
  • kicks3 — S3 bucket finder from html,js and bucket misconfiguration testing tool
  • 2tearsinabucket — Enumerate s3 buckets for a specific target.
  • s3_objects_check — Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.
  • s3tk — A security toolkit for Amazon S3
  • CloudBrute — Awesome cloud enumerator
  • s3cario — This tool will get the CNAME first if it’s a valid Amazon s3 bucket and if it’s not, it will try to check if the domain is a bucket name.
  • S3Cruze — All-in-one AWS S3 bucket tool for pentesters.

CMS​

  • wpscan — WPScan is a free, for non-commercial use, black box WordPress security scanner
  • WPSpider 2 — A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.
  • wprecon 1 — Wordpress Recon
  • CMSmap — CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
  • joomscan — OWASP Joomla Vulnerability Scanner Project
  • pyfiscan — Free web-application vulnerability and version scanner

JSON Web Token​

  • jwt_tool — A toolkit for testing, tweaking and cracking JSON Web Tokens
  • c-jwt-cracker — JWT brute force cracker written in C
  • jwt-heartbreaker — The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources
  • jwtear — Modular command-line tool to parse, create and manipulate JWT tokens for hackers
  • jwt-key-id-injector — Simple python script to check against hypothetical JWT vulnerability.
  • jwt-hack — jwt-hack is tool for hacking / security testing to JWT.
  • jwt-cracker — Simple HS256 JWT token brute force cracker

postMessage​

  • postMessage-tracker 1 — A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon
  • PostMessage_Fuzz_Tool — #BugBounty #BugBounty Tools #WebDeveloper Tool

Subdomain Takeover​

  • subjack 1 — Subdomain Takeover tool written in Go
  • SubOver 1 — A Powerful Subdomain Takeover Tool
  • autoSubTakeover — A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking out if subdomain takeover is possible.
  • NSBrute 1 — Python utility to takeover domains vulnerable to AWS NS Takeover
  • can-i-take-over-xyz 1 — “Can I take over XYZ?” — a list of services and how to claim (sub)domains with dangling DNS records.
  • cnames — take a list of resolved subdomains and output any corresponding CNAMES en masse.
  • subHijack 1 — Hijacking forgotten & misconfigured subdomains
  • tko-subs 1 — A tool that can help detect and takeover subdomains with dead DNS records
  • HostileSubBruteforcer — This app will bruteforce for exisiting subdomains and provide information if the 3rd party host has been properly setup.
  • second-order — Second-order subdomain takeover scanner
  • takeover — A tool for testing subdomain takeover possibilities at a mass scale.

Vulnerability Scanners​

  • nuclei — Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
  • Sn1per — Automated pentest framework for offensive security experts
  • metasploit-framework 1 — Metasploit Framework
  • nikto — Nikto web server scanner
  • arachni — Web Application Security Scanner Framework
  • jaeles — The Swiss Army knife for automated Web Application Testing
  • retire.js 2 — scanner detecting the use of JavaScript libraries with known vulnerabilities
  • Osmedeus — Fully automated offensive security framework for reconnaissance and vulnerability scanning
  • getsploit — Command line utility for searching and downloading exploits
  • flan — A pretty sweet vulnerability scanner
  • Findsploit — Find exploits in local and online databases instantly
  • BlackWidow — A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
  • backslash-powered-scanner — Finds unknown classes of injection vulnerabilities
  • Eagle — Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
  • cariddi — Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more…

Uncategorized​

  • JSONBee — A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
  • CyberChef — The Cyber Swiss Army Knife — a web app for encryption, encoding, compression and data analysis
  • bountyplz — Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)
  • PayloadsAllTheThings 1 — A list of useful payloads and bypass for Web Application Security and Pentest/CTF
  • bounty-targets-data 1 — This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
  • android-security-awesome — A collection of android security related resources
  • awesome-mobile-security — An effort to build a single place for all useful android and iOS security related stuff.
  • awesome-vulnerable-apps 2 — Awesome Vulnerable Applications
  • XFFenum — X-Forwarded-For [403 forbidden] enumeration
  • httpx — httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.
 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips

Similar threads

Top Bottom