
- Prague
-
12:00
- 1h ahead
Lists (8)
Sort Name ascending (A-Z)
Starred repositories
This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer while hunting. It is still under development, so feel free to co…
Map of Cybersecurity Sector in Lithuania
A suite integrating open-source workflows tailored for offensive security.
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure …
Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.
📡 PoC auto collect from GitHub.
Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .smali, .zip, .aar, .arsc, .aab, .jadx.kts).
A list of open source web security scanners
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
A curated list of Awesome Threat Intelligence resources
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Nuclei Templates Collection
This script Crawl the website and find the urls that contains html forms.
Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.
BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-…
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Gecko Backdoor is a most powerful web php backdoor.
Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Automatic SSTI detection tool with interactive interface
Huge Collection of Wordpress Exploits and CVES
cURL Tool Usage for OSINT (Open-Source Intelligence)