Awesome Bug Bounty Tools

A curated list of various bug bounty tools

Contents


Recon

Subdomain Enumeration

Port Scanning

Screenshots

Technologies

Content Discovery

Parameters

Fuzzing


Exploitation

Lorem ipsum dolor sit amet

Command Injection

CORS Misconfiguration

CRLF Injection

CSRF Injection

Directory Traversal

File Inclusion

GraphQL Injection

Header Injection

Insecure Deserialization

Insecure Direct Object References

Open Redirect

Race Condition

Request Smuggling

Server Side Request Forgery

SQL Injection

XSS Injection

XXE Injection


Miscellaneous

Lorem ipsum dolor sit amet

Passwords

Secrets

Git

Buckets

CMS

JSON Web Token

postMessage

Subdomain Takeover

Vulnerability Scanners


License

CC0

To the extent possible under law, vavkamil has waived all copyright and related or neighboring rights to this work.


  1. Thank you Vavkamil. What is shared will be copied. Everything you think you know, is because you did copy, else your wouldn’t identify a subject or a object.
  2. The right to copy is the right to transform what was already done, by those who were creative, using logic, to create new tools, based on what they already copy.
  3. I mean, in this case, the copy is the copy of text.
  4. I didn’t change much. awesome work you have here.
  5. Is like memory.. we are memory