Highlights
- Pro
Lists (3)
Sort Name ascending (A-Z)
Stars
Book Example Code for Hands-On Network Programming with C
A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.
a security scanner for custom LLM applications
JavaScript Change Monitor for Bug Bounty Hunting - High-performance Go rewrite
A powerful JavaScript monitoring tool for bug bounty hunters. Track changes in JavaScript files across websites, detect new attack surfaces, and stay ahead of security vulnerabilities.
New ways of breaking app-integrated LLMs
MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.
Extract URLs, paths, secrets, and other interesting bits from JavaScript
A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notifications or alerts.
Scanning APK file for URIs, endpoints & secrets.
Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
An open-source AI agent that lives in your terminal.
Awesome-LLM: a curated list of Large Language Model
Here are the challenges (including sources) of the GreHack CTF.
Cybersecurity AI (CAI), the framework for AI Security
Just A list Of Some Multilingual XSS Payloads and other weird ones i made
Beyond XSS: Explore the Web Front-end Security Universe. A series about front-end security
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
BackupFinder discovers backup files on web servers by generating intelligent patterns.
jxscout superpowers JavaScript analysis for security researchers
🐛 A list of writeups from the Google VRP Bug Bounty program