Stars
A tool for reverse engineering Android apk files
Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.
Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness
🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.
A modern, browser-based reconnaissance dashboard built for security professionals and bug bounty hunters.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
jxscout superpowers JavaScript analysis for security researchers
A list of free and open forensics analysis tools and other resources
this is a tool to detect the Web service is ok or not
Growing list of apps and tools for enhancing social media experiences.
Automatic SQL injection and database takeover tool
Camera phishing screen (to take photos from the front and rear cameras)
DeepTeam is a framework to red team LLMs and LLM systems.
A tool for collecting publicly exposed network cameras, with support for specifying country and region.
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
A list of public penetration test reports published by several consulting firms and academic security groups.
Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
An AI-powered vulnerability research framework for authorized security testing and bug bounty hunting.
🛍️ Typescript E-commerce Platform
Monitor linux processes without root permissions
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Swiss army knife of hacking written in Golang, capable of performing various kinds of attacks 🐉