Lists (1)
Sort Name ascending (A-Z)
Stars
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Making Favicon.ico based Recon Great again !
Python tool made to test CORS misconfiguration and create necessary PoC files
A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representations in Go.
notes and ramblings from my OSCP/PenTesting Studies
A curated list of available Bug Bounty & Disclosure Programs and Write-ups.
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
A hacking tool for bug bounties. Sharing and modifying is encouraged!
List of Awesome Red Teaming Resources
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Public library of space documents and tutorials
NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Redirects, leveraging advanced scanning and URL enumeration te…
Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and config files through path traversal vulnerabilities.
All about bug bounty (bypasses, payloads, and etc)
Writeup for the challenges in NahamCon CTF 2020
Tools & Interesting Things for RedTeam Ops
Yet another unofficial (and ugly) cross-platform MEGA downloader/uploader/streaming suite.
A curated list of various bug bounty tools
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Community curated list of templates for the nuclei engine to find security vulnerabilities.