Stars
Transpile curl commands into Python, JavaScript and 27 other languages
VimTeX: A modern Vim and neovim filetype plugin for LaTeX files.
Top disclosed reports from HackerOne
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mโฆ
Linux script to move windows across screens
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A wordlist of API names for web application assessments
A collection of custom security tools for quick needs.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A hands-on introduction to video technology: image, video, codec (av1, vp9, h265) and more (ffmpeg encoding). Translations: ๐บ๐ธ ๐จ๐ณ ๐ฏ๐ต ๐ฎ๐น ๐ฐ๐ท ๐ท๐บ ๐ง๐ท ๐ช๐ธ
The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, โฆ
Keyfinder๐ is a tool that let you find keys while surfing the web!
Subdomain enumeration and information gathering tool
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
A collection of resources for linux reverse engineering
update sqli-labs sources to adapte to php7(use mysqli_xxx functions to replace mysql_xxx ones)
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"
A curated list of amazingly awesome Burp Extensions
"Can I take over XYZ?" โ a list of services and how to claim (sub)domains with dangling DNS records.
An automated approach to performing recon for bug bounty hunting and penetration testing.
breaker01 / LazyRecon
Forked from capt-meelo/LazyReconAn automated approach to performing recon for bug bounty hunting and penetration testing.