A stealthy PHP-based fingerprinting tool to collect visitor data (IP, User-Agent, screen resolution, battery status, timezone, CPU cores, OS) and log
-
Updated
Nov 30, 2025 - PHP
A stealthy PHP-based fingerprinting tool to collect visitor data (IP, User-Agent, screen resolution, battery status, timezone, CPU cores, OS) and log
HunterVault is a comprehensive, web-based repository of 200+ bug bounty and penetration testing tools. This single-page application provides security researchers, ethical hackers, and bug bounty hunters with an organized reference of all essential security tools categorized by their functionality.
A complete, beginner-friendly yet professional documentation focused on understanding Retrieval-Augmented Generation (RAG) vulnerabilities, AI system vulnerabilities, their differences, and safe red‑team simulations.
A collection of resource exhaustion techniques, fork bombs, and system crash PoCs for red teamers and security researchers. For educational purposes only.
This repo is a curated, structured, and easy-to-read collection of notes from the DEF CON 27 Social Engineering Village (SEV). It compiles insights from multiple talks on social engineering, psychology, OSINT, red teaming, human behavior, and defensive strategies.
Add a description, image, and links to the ethical-security topic page so that developers can more easily learn about it.
To associate your repository with the ethical-security topic, visit your repo's landing page and select "manage topics."