Lists (1)
Sort Name ascending (A-Z)
Stars
Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.
A curated list of awesome reversing resources
A toolkit for detecting and protecting against vulnerabilities in Large Language Models (LLMs).
All-sources tool to search websites by favicons
403/401 Bypass Methods + Bash Automation + Your Support ;)
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automation tool to testing and confirm the xss vulnerability.
Create a USB Rubber Ducky like device using a Raspberry PI Pico
Collection of Cyber Threat Intelligence sources from the deep and dark web
A tool that automates the search for IDOR vulnerabilities in web apps and APIs
This is a python wrapper around the amazing KNOXSS API by Brute Logic
a lightweight, flexible and novel open source poc verification framework
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.
A curated list of GPT agents for cybersecurity
A Modern Framework for Bug Bounty Hunting
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
✂️ URL shortener web application based on the Laravel PHP Framework.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
A collection of one-liners for bug bounty hunting.
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
A curated list of various bug bounty tools