BasecrackDecode All Bases - Base Scheme Decoder
Stars: ✭ 196 (-2.49%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (+45.27%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-70.15%)
Bug Bounty ResponsesA collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (-77.11%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (-6.97%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-88.06%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-78.61%)
Learn365This repo is about @harshbothra_ 365 days of learning Tweet & Mindmap collection
Stars: ✭ 525 (+161.19%)
Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
Stars: ✭ 42 (-79.1%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-85.57%)
Defaultcreds Cheat SheetOne place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+869.65%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-83.58%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (-53.73%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+3.48%)
T1tl3A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title
Stars: ✭ 14 (-93.03%)
PastebinMarkdownXSSXSS in pastebin.com and reddit.com via unsanitized markdown output
Stars: ✭ 84 (-58.21%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+1457.71%)
Top25 ParameterFor basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (+93.03%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (+110.95%)
DomainedMulti Tool Subdomain Enumeration
Stars: ✭ 688 (+242.29%)
SubjackSubdomain Takeover tool written in Go
Stars: ✭ 1,194 (+494.03%)
S3scannerScan for open AWS S3 buckets and dump the contents
Stars: ✭ 1,319 (+556.22%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (-47.76%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-26.37%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-29.35%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+137.81%)
gradejsGradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+80.1%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+13.93%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-18.91%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-71.14%)
osmedeus-workflowCommunity Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own
Stars: ✭ 26 (-87.06%)
gwdomainssub domain wild card filtering tool
Stars: ✭ 38 (-81.09%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-57.71%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (-71.14%)
MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (+33.33%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (+33.33%)
Go DorkThe fastest dork scanner written in Go.
Stars: ✭ 274 (+36.32%)
fuzzmostall manner of wordlists
Stars: ✭ 23 (-88.56%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+88.06%)
BugbountyguideBug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
Stars: ✭ 338 (+68.16%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+153.23%)
BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (+64.68%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+3504.98%)
Assessment MindsetSecurity Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Stars: ✭ 608 (+202.49%)
BurpbountyBurp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
Stars: ✭ 1,026 (+410.45%)
HettyHetty is an HTTP toolkit for security research.
Stars: ✭ 3,596 (+1689.05%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-69.15%)
Rfd CheckerRFD Checker - security CLI tool to test Reflected File Download issues
Stars: ✭ 56 (-72.14%)
Gf SecretsSecret and/ credential patterns used for gf.
Stars: ✭ 96 (-52.24%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+433.83%)
Contact.shAn OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+7.46%)
Bugbounty CheatsheetA list of interesting payloads, tips and tricks for bug bounty hunters.
Stars: ✭ 3,644 (+1712.94%)
AutosetupAuto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: ✭ 140 (-30.35%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-9.45%)