Lists (3)
Sort Name ascending (A-Z)
Stars
Check if a phone number exists on Whatsapp
Functional enhancement based on nuclei. 基于 nuclei 的功能增强。
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and control.
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Ultimate Package Of 50 Bug Bounty Hunting Tools
A list of public penetration test reports published by several consulting firms and academic security groups.
Track web page scrolling with JS. No dependencies. Callbacks based
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF