Black Hat Ethical Hacking's repositories
Bug_Bounty_Tools_and_Methodology
Bug Bounty Tools used on Twitch - Recon
Nucleimonst3r
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
SecretOpt1c
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
TerminatorZ
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
fetchmeurls
A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)
SQLMutant
SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
ScopeHunter
ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.
bf_active_sub
Subdomain Bruteforce - Bounty Quick Code
OpenRediWrecked
A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of carefully crafted payloads with encoding techniques.
s3-buckets-aio-pwn
An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
SQL-INJECTION-PWN
A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty
bheh-sub-pwner
This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save the results in a separate file, it will then resolve all the subdomains into ip addresses and save the results separately.
bheh_conky_theme
Black Hat Ethical Hacking - Official Theme for Conky Manager
blackhatethicalhacking
Who We Are
InfoSec-Black-Friday
All the deals for InfoSec related software/tools this Black Friday
bounty-targets-data
This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
dalfox-burp-oneliner
Personal - Experimentation
perl-programming-training
This Repo is a quick tutorial that introduces various aspects of the Perl programming language and examples curated by BHEH. Perl Language can be useful for ethical hacking, security research, and penetration testing.
Burp-Suite-Pro
A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.
bypass-url-parser
bypass-url-parser