
Highlights
Lists (4)
Sort Name ascending (A-Z)
Starred repositories
Tools and methods that I personally use for Recon and Exploitations
DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.
A list of different types of API keys and how to prove impact for bug bounty programs.
A collection of useful resources for hacking WordPress and it's plugins and themes
DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.
This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and then automating finding of sensitive information on all the …
Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets
This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.
This Chromium extension scans the page for external iFrames, Scripts, and Styles, logs them to the console, and checks if their domains are resolvable.
Not so awesome Web3 Security Reasearcher roadmap by tpiliposian
anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, and scan js files source code.
Zero shot vulnerability discovery using LLMs
GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)
Contains nuclei templates for security testing and POCs.
SubOwner - A Simple tool check for subdomain takeovers.
403/401 Bypass Methods + Bash Automation + Your Support ;)