Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.
☆19May 26, 2025Updated 9 months ago
Alternatives and similar repositories for android-config
Users that are interested in android-config are comparing it to the libraries listed below
Sorting:
- ☆22Mar 18, 2024Updated last year
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Jun 12, 2024Updated last year
- ☆13Mar 15, 2022Updated 3 years ago
- bchecks for burpsuite☆14Oct 9, 2023Updated 2 years ago
- ☆22Aug 9, 2025Updated 6 months ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 2 years ago
- ☆33Apr 22, 2025Updated 10 months ago
- Nuclei Templates☆25Oct 17, 2024Updated last year
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- Machine Learning Quick Reference Guide☆28Jun 8, 2024Updated last year
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆28Jul 20, 2022Updated 3 years ago
- ☆11Jun 10, 2025Updated 8 months ago
- ☆37Feb 18, 2026Updated last week
- ☆10Oct 1, 2019Updated 6 years ago
- ☆59Sep 8, 2025Updated 5 months ago
- Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.☆95Feb 21, 2026Updated last week
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- ☆237Dec 10, 2025Updated 2 months ago
- HTB write-ups with detailed walkthroughs, screenshots, and tutorials for ethical hacking, CTF challenges, and penetration testing.☆22Nov 10, 2025Updated 3 months ago
- Automate the setup of Damn Vulnerable Web Application (DVWA) with this Bash script. It ensures a smooth installation, adapting to the sys…☆11Oct 15, 2025Updated 4 months ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- ☆10Jan 18, 2023Updated 3 years ago
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆58Updated this week
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆45Mar 5, 2025Updated 11 months ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- ☆46Nov 22, 2025Updated 3 months ago
- LFI/RFI Payload Tests Project☆36Oct 21, 2019Updated 6 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- my nuclei templates #new☆11Jun 24, 2024Updated last year