Lists (1)
Sort Name ascending (A-Z)
Stars
The SpecterOps project management and reporting engine
Scrapy download handler that can impersonate browser' TLS signatures or JA3 fingerprints.
Extensão para navegadores baseado em chromium. Analisa o código client-side em busca de possíveis vulnerabilidades de forma passiva.
Proxy server to bypass Cloudflare protection
HTML parser for PEAS output with additional features
Firefly III: a personal finances manager
A utility to detect various technology for a given IP address.
Various *nix tools built as statically-linked binaries
Utility to enumerate users, groups and computers from a Windows domain through LDAP queries
Collection of userstyles affecting the browser
Esse guia contém todas as informações necessárias para se introduzir na área de segurança da informação, dessa maneira, você encontrará, cursos, indicações de livros, roadmaps, playlists, certifica…
Beyond XSS: Explore the Web Front-end Security Universe. A series about front-end security
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
This roadmap was built by someone who went from nothing to Principal Security Engineer in under 6 years. No college degree. No connections. No excuses. Just a belief that anyone can master cybersec…