Lists (2)
Sort Name ascending (A-Z)
Starred repositories
Bitwarden infrastructure/backend (API, database, Docker, etc).
Automatically install all Kali linux tools
A big list of Android Hackerone disclosed reports and other resources.
Scanning APK file for URIs, endpoints & secrets.
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
All about bug bounty (bypasses, payloads, and etc)
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Collection of methodology and test case for various web vulnerabilities.
A list of interesting payloads, tips and tricks for bug bounty hunters.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Fast passive subdomain enumeration tool.
A list of resources for those interested in getting started in bug bounties
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collected list of awesome security talks
A collection of hacking / penetration testing resources to make you better!
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deauthentication, and monitoring. Use responsibly a…