aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-49.41%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+344.71%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (+398.82%)
Bucket-FlawsBucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Stars: ✭ 43 (-49.41%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-27.06%)
SecuritySome of my security stuff and vulnerabilities. Nothing advanced. More to come.
Stars: ✭ 835 (+882.35%)
AcamarA Python3 based single-file subdomain enumerator
Stars: ✭ 89 (+4.71%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+910.59%)
QuiverQuiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (+64.71%)
RescopeRescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (+83.53%)
SuboverA Powerful Subdomain Takeover Tool
Stars: ✭ 607 (+614.12%)
auth analyzerBurp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.
Stars: ✭ 77 (-9.41%)
www-project-zapOWASP Zed Attack Proxy project landing page.
Stars: ✭ 52 (-38.82%)
vapivAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Stars: ✭ 674 (+692.94%)
quick-recon.pyDo some quick reconnaissance on a domain-based web-application
Stars: ✭ 13 (-84.71%)
keyonic-v2A Keycloak Mobile Implementation using Angular v4 and Ionic v3
Stars: ✭ 23 (-72.94%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-70.59%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+176.47%)
powerauth-cryptoPowerAuth - Open-source solution for authentication, secure data storage and transport security in mobile banking.
Stars: ✭ 48 (-43.53%)
sheriffBuild simple and robust authorization systems with just Elixir and Plug
Stars: ✭ 39 (-54.12%)
windows-Credential-Provider-libraryThis repository will be updated with all the examples and links that I can find with relevant knowledge & information about CP in MS Windows vista up to version 10.
Stars: ✭ 122 (+43.53%)
leaky-pathsA collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Stars: ✭ 507 (+496.47%)
spartanA Scalable Client Authentication & Authorization System for Container-based Environments
Stars: ✭ 17 (-80%)
PandorasBoxSecurity tool to quickly audit Public Box files and folders.
Stars: ✭ 56 (-34.12%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (-61.18%)
FacebookBugFacebook Write-ups, PoC, and exploitation codes:
Stars: ✭ 28 (-67.06%)
Casbin4DAn authorization library that supports access control models like ACL, RBAC, ABAC in Delphi
Stars: ✭ 25 (-70.59%)
ORtesterOpen Redirect scanner - (out of date)
Stars: ✭ 24 (-71.76%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+0%)
rbac-react-redux-aspnetcoreA starter template for creating JWT token from ASP.NET Core API project and applying that JWT token authentication on React application
Stars: ✭ 54 (-36.47%)
swiss-bugbounty-programsList of bug bounty and coordinated vulnerability disclosure programs of companies/organisations in Switzerland
Stars: ✭ 25 (-70.59%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-83.53%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (+1022.35%)
EagleMultithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
Stars: ✭ 85 (+0%)
node-js-jwt-authNode.js Demo for Token Based Authentication (JWT) with MySQL database
Stars: ✭ 161 (+89.41%)
reFlutterFlutter Reverse Engineering Framework
Stars: ✭ 698 (+721.18%)
jwt-goThe easiest JWT library to GO
Stars: ✭ 15 (-82.35%)
aeacus🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (-38.82%)
erebusErebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.
Stars: ✭ 72 (-15.29%)
gitls🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline
Stars: ✭ 39 (-54.12%)
open-psd2An open source framework for using banking API's built for PSD2 regulation.
Stars: ✭ 20 (-76.47%)
hapi-acl-authAuthentication provider agnostic authorization plugin for HapiJS
Stars: ✭ 22 (-74.12%)
DomainkerBugBounty Tool
Stars: ✭ 40 (-52.94%)
django-sitegateReusable application for Django to ease sign up & sign in processes
Stars: ✭ 32 (-62.35%)
macaroonsAn Erlang Macaroons library compatible with libmacaroons
Stars: ✭ 27 (-68.24%)
dictatorDictates what your users see. Plug-based authorization.
Stars: ✭ 77 (-9.41%)
praetorianA minimalist Crystal authorization system inspired by https://github.com/varvet/pundit.
Stars: ✭ 54 (-36.47%)
RoleBasedAuthWithBlazorCompanion code sample for my blog post - Configuring Role-based Authorization with client-side Blazor
Stars: ✭ 22 (-74.12%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-74.12%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-77.65%)
aneweranewer appends lines from stdin to a file if they don't already exist in the file. This is a rust version of https://github.com/tomnomnom/anew
Stars: ✭ 46 (-45.88%)