Security Analyst and Part-time Bug Hunter.
CISSP | CISM | CompTIA Security+ (Cybrary)
- Indonesia, Jawa Barat, Depok
-
19:18
(UTC +07:00) - w1th0ut.github.io
Highlights
- Pro
Stars
7
stars
written in Go
Clear filter
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...
Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
jsleak is a tool to find secret , paths or links in the source code during the recon.