Stars
Firepwn is a tool made for testing the Security Rules of a firebase application.
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Open-source AI agents for penetration testing
SecureFlag Knowledge Base for SonarQube is a plugin that enumerates over recent vulnerabilities and security hotspots, attempting to find relevant training labs or material from the SecureFlag Knowโฆ
๐ฅ SSE firehose of GitHub public timeline
Scan for secrets in dangling commits on GitHub using GH Archive data.
AI agent for autonomous cyber operations
Latest CVEs with their Proof of Concept exploits.
A python script that finds endpoints in JavaScript files
A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.
๐ An opinionated, unstyled static blogging template โ built with Astro, Tailwind, and shadcn/ui.
A Windows AD Password Manager for ATTACKER(Redteamer/Pentester).
Determines which markup library to use to render a content file (e.g. README) on GitHub
Drag and drop page builder library written in vanilla javascript without dependencies or build tools.
gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory environment.
Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...
pwninit - automate starting binary exploit challenges
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
A set of beautifully-designed, accessible components and a code distribution platform. Works with your favorite frameworks. Open Source. Open Code.
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
A curated list of wordlists for bruteforcing and fuzzing