Black Hat Ethical Hacking's repositories
Bug_Bounty_Tools_and_Methodology
Bug Bounty Tools used on Twitch - Recon
Nucleimonst3r
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
SecretOpt1c
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
DDoS-Layer7-bheh
An Advanced Layer 7 DDoS tool written by Black Hat Ethical Hacking
TerminatorZ
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
SQLMutant
SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
ScopeHunter
ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.
OpenRediWrecked
A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of carefully crafted payloads with encoding techniques.
SQL-INJECTION-PWN
A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty
bf_active_sub
Subdomain Bruteforce - Bounty Quick Code
s3-buckets-aio-pwn
An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
bheh-sub-pwner
This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save the results in a separate file, it will then resolve all the subdomains into ip addresses and save the results separately.
bheh_conky_theme
Black Hat Ethical Hacking - Official Theme for Conky Manager
blackhatethicalhacking
Who We Are
dangerzone
Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs
EmailAnalyzer
With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links and hashes from the .eml file
bounty-targets-data
This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
dalfox-burp-oneliner
Personal - Experimentation
bypass-url-parser
bypass-url-parser