Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
jq for binary formats - tool, language and decoders for working with binary and text formats
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
DetectDee: Hunt down social media accounts by username, email or phone across social networks.
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable SSRF candidates.
Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.
Takes a list of URLs and returns their HTTP response codes
A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon
Identify virtual hosts by similarity comparison
Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzzing payloads.
movie_camera Build a remote camera with a raspberryPI and webcam, and always have an eye on your growth.. README ->
Automate tool for android pentesting to extract firebase url and check it is accessible or not.