Skip to content
View sojourn99's full-sized avatar
  • Netherlands

Block or report sojourn99

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Hacking

38 repositories

The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)

PHP 473 104 Updated May 20, 2023

30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…

Python 952 140 Updated Dec 3, 2025

Fetch all the URLs that the Wayback Machine knows about for a domain

Go 4,346 539 Updated May 1, 2024

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 69,294 24,915 Updated Mar 7, 2026

Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists

Go 768 109 Updated Feb 12, 2023

Generates permutations, alterations and mutations of subdomains and then resolves them

Python 2,478 447 Updated Jan 9, 2025

EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.

Python 5,656 903 Updated Jan 5, 2026

A security tool for grabbing screenshots of many web hosts

Python 326 50 Updated Jul 17, 2017
Ruby 626 135 Updated Feb 1, 2024

Find interesting Amazon S3 Buckets by watching certificate transparency logs.

Python 1,800 208 Updated Feb 28, 2025

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

6,089 1,199 Updated Aug 14, 2024

Reconnaissance tool for GitHub organizations

Go 6,140 846 Updated Sep 20, 2022

Find, verify, and analyze leaked credentials

Go 24,936 2,250 Updated Mar 7, 2026

Scanning pastebin with yara rules

Python 1,128 225 Updated Jan 10, 2026

Web path scanner

Python 14,052 2,427 Updated Feb 20, 2026

Official module repository for the Recon-ng Framework.

Python 257 95 Updated Jul 12, 2024

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …

Go 27,358 3,256 Updated Mar 7, 2026

IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.

C 872 151 Updated Oct 5, 2025

Automated Penetration Testing Agentic Framework Powered by Large Language Models

Python 11,953 2,029 Updated Feb 23, 2026

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

Boo 2,325 429 Updated Dec 6, 2023

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

Python 5,422 845 Updated Nov 1, 2024

Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.

2,737 177 Updated Oct 27, 2021

LinkedIn Recon Tool

Python 1,198 212 Updated Mar 6, 2023

Shared Blogs and Notebooks

Jupyter Notebook 493 61 Updated Jan 23, 2026

This repository is a collection of powershell functions every hacker should know

PowerShell 1,444 170 Updated Jun 16, 2024

PowerShell Tools for DevOps

PowerShell 149 31 Updated Sep 15, 2024

PowerShell for every system!

C# 51,760 8,204 Updated Mar 6, 2026

The Bluetooth penetration testing tool suite

C 130 41 Updated Feb 12, 2020

A pure-python win32 debugger interface I wrote but no longer maintain.

Python 12 2 Updated May 24, 2012

Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.

HTML 905 169 Updated Feb 25, 2020