leaky-pathsA collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Stars: ✭ 507 (+2882.35%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+42523.53%)
presentationsPresentations at the Tokyo Nixos Meetup
Stars: ✭ 57 (+235.29%)
project-blackPentest/BugBounty progress control with scanning modules
Stars: ✭ 279 (+1541.18%)
VPS-Bug-Bounty-ToolsScript that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (+158.82%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-11.76%)
hydra-hppHydra Hot Potato Player (game)
Stars: ✭ 12 (-29.41%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+394.12%)
Awesome-HTTPRequestSmugglingA curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻
Stars: ✭ 97 (+470.59%)
request smugglerHttp request smuggling vulnerability scanner
Stars: ✭ 203 (+1094.12%)
flydnsRelated subdomains finder
Stars: ✭ 29 (+70.59%)
dontgo403Tool to bypass 40X response codes.
Stars: ✭ 457 (+2588.24%)
hydra-jsDOES NOT WORK WITH VERSIONS > 0.10.0 - A simple library to help you build node-based identity providers that work with Hydra.
Stars: ✭ 17 (+0%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (+252.94%)
SQLi-Query-TamperingSQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (+623.53%)
apkizerapkizer is a mass downloader for android applications for all available versions.
Stars: ✭ 40 (+135.29%)
fdnssearchSwiftly search FDNS datasets from Rapid7 Open Data
Stars: ✭ 19 (+11.76%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+2711.76%)
hydra-routerA service aware router for Hydra Services. Implements an API Gateway and can route web socket messages.
Stars: ✭ 59 (+247.06%)
specificationRDF vocabulary and specification
Stars: ✭ 21 (+23.53%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (+94.12%)
gatlingHydra-enabled GPU path tracer that supports MaterialX and MDL.
Stars: ✭ 159 (+835.29%)
Bugs-feedBug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...
Stars: ✭ 90 (+429.41%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+1123.53%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (+517.65%)
WhoEnumMass querying whois records
Stars: ✭ 24 (+41.18%)
shaniaScan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (+217.65%)
PayloadsAllA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (+82.35%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+1000%)
bhedakA replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.
Stars: ✭ 77 (+352.94%)
hydra-antliaA collection of functions for Hydra
Stars: ✭ 45 (+164.71%)
hykuHyku: A multi-tenant Hyrax application built on the latest and greatest Samvera community components. Brought to you by the Hydra-in-a-Box project partners and IMLS; maintained by the Hyku Interest Group.
Stars: ✭ 83 (+388.24%)
nerdbugFull Nuclei automation script with logic explanation.
Stars: ✭ 153 (+800%)
micro-sentryTiny Sentry client with idiomatic wrapper for Angular
Stars: ✭ 100 (+488.24%)
InventusInventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.
Stars: ✭ 80 (+370.59%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+1247.06%)
KaliIntelligenceSuiteKali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (+241.18%)
Bucket-FlawsBucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Stars: ✭ 43 (+152.94%)
Jira-LensFast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+988.24%)
BurpSQLTruncSannerMessy BurpSuite plugin for SQL Truncation vulnerabilities.
Stars: ✭ 53 (+211.76%)
EmissarySend notifications on different channels such as Slack, Telegram, Discord etc.
Stars: ✭ 33 (+94.12%)
gf-patternsCollection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (+58.82%)
ICUAn Extended, Modulair, Host Discovery Framework
Stars: ✭ 40 (+135.29%)
HostPanicFind host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (+35.29%)
BugBountyHuntingScriptsI built some bash functions to help me while doing mundane and repetitive tasks using BBRF, Nuclei or other Bug bounty tool.
Stars: ✭ 160 (+841.18%)
lightning-transformersFlexible components pairing 🤗 Transformers with Pytorch Lightning
Stars: ✭ 551 (+3141.18%)
Bug-HuntingA Collection of Notes, Methodologies, POCs and everything else related to Bug Hunting.
Stars: ✭ 110 (+547.06%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (+694.12%)
roboxtractorExtract endpoints marked as disallow in robots files to generate wordlists.
Stars: ✭ 40 (+135.29%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+311.76%)
SourceWolfAmazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (+676.47%)
ShadowCloneUnleash the power of cloud
Stars: ✭ 224 (+1217.65%)
Virtual-HostModified Nuclei Templates Version to FUZZ Host Header
Stars: ✭ 38 (+123.53%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+164.71%)