Tools of "The Bug Hunters Methodology V2 by @jhaddix"
-
Updated
Aug 11, 2017 - Shell
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
Tools of "The Bug Hunters Methodology V2 by @jhaddix"
A tool for fetching archived URLs (to be rewritten in Go).
Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
zap(zed attack proxy) daemon mode buildpack of heroku
Theif is a subdomain takeover wrapper/tool made in BASH.
Simple wrapper for meg that sieves through meg's output for you.
Web application recon for bug bounty
Find domains and subdomains from https://crt.sh
Copy all files found from AWS S3 bucket to local
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
An automated approach to performing recon for bug bounty hunting and penetration testing.
Web application pentesting recon
Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Get all possible href | src | url from target url or domain
A recursive subdomain enumeration script for crt.sh
A command line tool to retrieve CIDR info of a target during security engagements.