ipsourcebypassThis Python script can be used to bypass IP source restrictions using HTTP headers.
Stars: ✭ 326 (+0.93%)
Virtual-HostModified Nuclei Templates Version to FUZZ Host Header
Stars: ✭ 38 (-88.24%)
AsnipASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-60.99%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+307.43%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+10088.54%)
AllaboutbugbountyAll about bug bounty (bypasses, payloads, and etc)
Stars: ✭ 758 (+134.67%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-49.85%)
WDIRGood resources about web security that I have read.
Stars: ✭ 14 (-95.67%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+32.2%)
CloudmareCloudflare, Sucuri, Incapsula real IP tracker.
Stars: ✭ 213 (-34.06%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-47.68%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+74.61%)
Blind-SSRFNuclei Templates to reproduce Cracking the lens's Research
Stars: ✭ 111 (-65.63%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (-58.2%)
CommandGenInterfaceSimple vueJS based command generator which I developed in order to learn vueJS a little bit more.
Stars: ✭ 17 (-94.74%)
kube-scanKubernetes Scanner
Stars: ✭ 32 (-90.09%)
bacnet-stackBACnet Protocol Stack library provides a BACnet application layer, network layer and media access (MAC) layer communications services.
Stars: ✭ 199 (-38.39%)
remoteaddrGo http real ip header parser
Stars: ✭ 18 (-94.43%)
ipImmutable value object for IPv4 and IPv6 addresses, including helper methods and Doctrine support.
Stars: ✭ 212 (-34.37%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-63.16%)
sledgehammer🔨 📶 WiFi-Jammer/DoS toolset
Stars: ✭ 34 (-89.47%)
bypass-clmPowerShell Constrained Language Mode Bypass
Stars: ✭ 124 (-61.61%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (-42.11%)
FreeGithub😊自动获取github相关网站的ip地址,解决github链接不畅通的问题
Stars: ✭ 45 (-86.07%)
watsorObject detection for video surveillance
Stars: ✭ 203 (-37.15%)
AggregatorA stand-alone class implementation of the IPv4+IPv6 IP+CIDR aggregator from CIDRAM.
Stars: ✭ 19 (-94.12%)
Bucket-FlawsBucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Stars: ✭ 43 (-86.69%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-86.07%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+35.6%)
nerdbugFull Nuclei automation script with logic explanation.
Stars: ✭ 153 (-52.63%)
gozeitGoZeit
Stars: ✭ 19 (-94.12%)
nozakiHTTP fuzzer engine security oriented
Stars: ✭ 37 (-88.54%)
centCommunity edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (-2.48%)
SQLi-Query-TamperingSQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (-61.92%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-73.99%)
ipd查询ip地理信息,多种查询模式,高效,具有缓存机制,并可使用elasticsearch构建自己的ip数据库
Stars: ✭ 24 (-92.57%)
Ip🌏根据IpV4、IpV6地址获取定位信息的PHP🐘组件 PHP components that obtain location information based on IpV4, IpV6 addresses
Stars: ✭ 23 (-92.88%)
httpie-aws-authv4AWS Auth v4 (API Gateway, Elasticsearch, etc) plugin for HTTPie
Stars: ✭ 37 (-88.54%)
botanalysebotsonar analyse open api
Stars: ✭ 19 (-94.12%)
PythonPython Powered Repository
Stars: ✭ 17 (-94.74%)
HellgateLoader CSharpLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-77.4%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (-77.09%)
gf-patternsCollection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (-91.64%)
server-ip-addressesDaily updated list of IP addresses / CIDR blocks used by data centers, cloud service providers, servers, etc.
Stars: ✭ 74 (-77.09%)
PinaakA vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
Stars: ✭ 69 (-78.64%)
bug-bountyMy personal bug bounty toolkit.
Stars: ✭ 127 (-60.68%)
china-ip-list每小时更新中国IP范围列表,Update Mainland China ip‘s list in everyhour
Stars: ✭ 40 (-87.62%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+173.99%)
portakalBulk port checker written with Go
Stars: ✭ 18 (-94.43%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-78.33%)
labyrinth[DEPRICATED] Labyrinth is a anti-censorship Web Browser created to bypass DPI, Blocklists, Port Filtering, Firewalls and DNS censorship all in one
Stars: ✭ 17 (-94.74%)
iBadAppleFirst ever: Windows, free iCloud & activation lock bypass... that isn't a malware!
Stars: ✭ 133 (-58.82%)