Lists (6)
Sort Name ascending (A-Z)
Starred repositories
An opinionated list of awesome Python frameworks, libraries, software and resources.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Drop in a screenshot and convert it to clean code (HTML/Tailwind/React/Vue)
Hunt down social media accounts by username across social networks
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
A swiss army knife for pentesting networks
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Awesome hacking is an awesome collection of hacking tools.
A OSINT tool to obtain a target's phone number just by having his email address
SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Türk kullanıcıların parola seçimlerinin analizi için yapılmış bir çalışmadır
An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and groups.
A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single automated workflow.