Cyber
The recursive internet scanner for hackers. 🧡
Sourcetrail - free and open-source interactive source explorer
Cyber Threat Intelligence Repository expressed in STIX 2.0
an awesome list of honeypot resources
A small and sweet man-in-the-middle proxy capable of doing HTTP and HTTP over SSL.
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way that specific situations are handled in bug bounties.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
A multi-arch assembly REPL and emulator for your command line.
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
A collection of tools to perform searches on GitHub.
A curated list of various bug bounty tools
Python 3 and JavaScript interoperability. Successor To PyV8 (https://github.com/flier/pyv8)
A simple sqlmap csrf token extractor and proxy
A cheat sheet that contains advanced queries for SQL Injection of all types.
BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.
Top disclosed reports from HackerOne
Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injections, wordlists of tools, etc.
A collection of all the data i could extract from 1 billion leaked credentials from internet.


