Starred repositories
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
🤪 A list of funny and tricky JavaScript examples
Weaponizing for privileged file writes bugs with windows problem reporting
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
Web and mobile application security training platform
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
A collection of awesome one-liner scripts especially for bug bounty tips.
Accept URLs on stdin, replace all query string values with a user-supplied value
A fast, simple, recursive content discovery tool written in Rust.
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
Striker is an offensive information and vulnerability scanner.
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Take a list of domains and probe for working HTTP and HTTPS servers
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
A big list of Android Hackerone disclosed reports and other resources.