Skip to content
#

bug-bounty-tools

Here are 74 public repositories matching this topic...

A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

  • Updated Dec 8, 2025
  • Go

A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.

  • Updated Dec 5, 2025

A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

  • Updated Dec 8, 2025
  • Go

A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embedded in webpages, parsing resources like sitemaps and robots.txt files, and even processing local files - to uncover every URL.

  • Updated Dec 8, 2025
  • Go

A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disk forensics, memory analysis, network monitoring, malware analysis, and more.

  • Updated Mar 22, 2025

A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation tactics and improve defense mechanisms.

  • Updated Apr 7, 2025

COLI (Command Orchestration & Logic Interface) – A visual orchestration layer for EWE, built for bug bounty automation. Create and run CLI workflows visually, manage scopes, monitor scans in real-time, and chain tools like subfinder → httpx → nuclei in a single streamlined interface.

  • Updated Oct 15, 2025
  • JavaScript

🔥 Pentest Toolkit – 100+ FREE Tools for Bug Bounty, Ethical Hacking & Red Team Automated recon, vulnerability scanning, exploitation & reporting | Kali Linux ready | Python + Bash versions

  • Updated Nov 21, 2025
  • Python

Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google search queries to help you find data and vulnerabilities more easily. Perfect for anyone interested in cybersecurity, it makes searching more effective and efficient.

  • Updated Aug 10, 2025
  • HTML

Improve this page

Add a description, image, and links to the bug-bounty-tools topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the bug-bounty-tools topic, visit your repo's landing page and select "manage topics."

Learn more