PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
-
Updated
Nov 10, 2025 - Ruby
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Homebrew tap for installing the Netlas CLI. Provides easy installation and updates for macOS and Linux users.
Strips HTTP/HTTPS protocols from URL lists to prepare clean URLs for bug bounty tools like eyewitness, gowitness, and port scanners.
Hunt robots.txt via CLI
Scripts, POCs & bullshit
Ruby package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)
Cyber Security Blog and Articles
A subdomain enumeration suite.
This Metasploit auxiliary module scans all subdomains of a given domain for: 🔍 Open ports using Nmap 🛡️ Vulnerabilities using Nuclei ☁️ Azure tenant information
This Metasploit auxiliary module scans a list of subdomains to check for active hosts, takeover vulnerabilities, and potential XSS flaws.
hacking blog
SHIFU is a command-line tool for fetching Common Vulnerabilities and Exposures (CVE) information.
DarkAngel 是一款全自动白帽漏洞扫描器,从hackerone、bugcrowd资产监听到漏洞报告生成、漏洞URL截屏、消息通知。
Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework