Highlights
Starred repositories
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Burpsuite plugin for Interact.sh
A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabilities
This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.
Cross platform GUI toolkit in Go inspired by Material Design
A quick βn dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.
Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in their official BApp Store).
Hunts out CobaltStrike beacons and logs operator command output
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous β¦
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
A list of interesting payloads, tips and tricks for bug bounty hunters.
XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
A collection of hacking tools, resources and references to practice ethical hacking.
This repo contains some Amsi Bypass methods i found on different Blog Posts.
A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Tools to set up a quick macOS VM in QEMU, accelerated by KVM.