whalebone7's Stars
whalebone7/EagleEye
To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run ./ee.sh -f "path/to/index_screenshot.txt" -k "hacked" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots.
sansatart/scrapts
Scrapts Scrapts Scrapts
sw33tLie/bbscope
Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
sannemaasakkers/Sansomware
whalebone7/hs
`hs` organizes subdomains into separate files based on their status codes and stores them in a "sorted" directory. It simplifies subdomain management and helps users quickly identify and access subdomains based on their respective status codes.
whalebone7/FfufMaster
Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.
whalebone7/GitSniff
GitSniff searches for a specific keyword in the code of GitHub repositories using an access token, and reports back the repository name, owner, and path where the keyword was found. It is useful for bug bounty hunters to find vulnerable code and potential security issues in repositories.