Lists (32)
Sort Name ascending (A-Z)
AD
Android
API
BB
Cheat sheet
Checklist
Cloud
CRLF
CVE
Dorks
endpoints
File upload
GraphQL
Java
JWT
Open Redirect
os
OSCP
OSINT
PoC
Red Team
Resources
RFI-LFI
Smart Con
SQLI
SSRF
Tools
Utilities
Windows
Wordlists
XSS
XXE
Stars
Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.
This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
Checks if an Android application has successfully completed the "App Link Verification" process for Android App Links.
Quark Agent - Your AI-powered Android APK Analyst
(WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Swift Apps Reverse Engineering reading book
Unix command line utilities installer for Windows.
OWASP iGoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Scanning APK file for URIs, endpoints & secrets.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
📡 PoC auto collect from GitHub.
Android Reverse-Engineering Workbench for VS Code
A PowerShell script anti-virus evasion tool
A collection of awesome one-liner scripts especially for bug bounty tips.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)
Low and slow password spraying tool, designed to spray on an interval over a long period of time
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…