Stars
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-d…
The recursive internet scanner for hackers. 🧡
Responsive Portfolio Website Using HTML, CSS & JavaScript
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Gospider - Fast web spider written in Go
Find domains and subdomains related to a given domain
Open source education content for the researcher community
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
All about bug bounty (bypasses, payloads, and etc)
In-depth attack surface mapping and asset discovery
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
🕵️♂️ All-in-one OSINT tool for analysing any website
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just interested in infosec topics.
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Collect information of Windows PC when doing incident response