Lists (3)
Sort Name ascending (A-Z)
Stars
Get IP address on other side audio call in Telegram.
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.
Tips and Tutorials for Bug Bounty and also Penetration Tests.
A collection of awesome one-liner scripts especially for bug bounty tips.
A curated list of various bug bounty tools
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
A list of interesting payloads, tips and tricks for bug bounty hunters.
a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty
🔓 🔓 Find secrets and passwords in container images and file systems 🔓 🔓
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information colle…
This is an Open source intelligent framework ie an osint tool which gathers valid information about a phone number, user's email address, perform VIN Osint, and reverse, perform subdomain enumerati…
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that you enter. Author: Jolanda de Koff
NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Redirects, leveraging advanced scanning and URL enumeration te…
Strengthen your defense against web attacks with Kali Linux and Metasploit
PassGAN source code for Python 3 & TensorFlow 1.13 with a pre-trained model. https://arxiv.org/abs/1709.00440
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
bandobo / aws-vault
Forked from 99designs/aws-vaultA vault for securely storing and accessing AWS credentials in development environments
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
An Emacs configuration bundle with batteries included
Serverless CSP violation reporting server that streams reports to a S3 data lake, and enables easy querying using Athena.
Compilation of Cyber Security Cheat Sheets
BoSMK / attack_range_local
Forked from splunk/attack_range_localBuild a attack range in your local machine
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.