Stars
Certificate transparency for Android and JVM
Quickly converts curl commands into Burp Suite Repeater requests.
OptiKey - Full computer control and speech with your eyes
Build OpenApi specs for your APIs from Burp's traffic using Levo.ai. Also detect the PII in your APIs.
Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your security workflows effortlessly!
A list of cyber-chef recipes and curated links
Improve automated and semi-automated active scanning in Burp Pro
Misc dictionaries for directory/file enumeration, username enumeration, password dictionary/bruteforce attacks
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
A list of public penetration test reports published by several consulting firms and academic security groups.
This repository is about @AnubhavSingh_'s 365 days of Learning Tweets collection.
Automated NoSQL database enumeration and web application exploitation tool.
Automatic SQL injection and database takeover tool
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
search Google and extract results directly. skip all the click-through links and other sketchiness
Generate Email, Register for anything, Get the OTP/Link
Free Introduction to Bash Scripting eBook
PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.