HackCommander / hackcommander.github.io
This is my personal blog where I talk about science and technology, especially about offensive cybersecurity.
☆11Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for hackcommander.github.io
- Web Application Penetration Testing☆93Updated 3 months ago
- A simple bash script to gather js files from waybackurls and check for any exposures using nuclei engine.☆0Updated 8 months ago
- ☆9Updated 4 years ago
- Private Nuclei Templates☆88Updated last year
- ☆57Updated 3 months ago
- ☆17Updated 11 months ago
- ☆32Updated 10 months ago
- Web Crawler for Identifying Entry Points☆11Updated 7 months ago
- My small collection of reports templates☆76Updated 5 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆23Updated last year
- This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy.☆73Updated 5 months ago
- 403Bypasser is a simple plugin that lets you bypass 403 status code by transforming HTTP requests with custom templates.☆24Updated last month
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆24Updated 3 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆22Updated 11 months ago
- Collection of some pentesting and bugbounty resources☆42Updated 2 years ago
- Bug Bounty Web and API Payloads☆30Updated 2 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆49Updated last month
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆87Updated 2 years ago
- Blank methodology sheet for the OSWE exam☆11Updated 2 years ago
- ☆38Updated 3 years ago
- A collection of automation scripts for bug bounty hunting.☆29Updated last year
- My custom created nuclei for SQLi, bugbounty, pentesting☆20Updated last month
- Describe how to use ffuf different options with examples☆80Updated last year
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Updated last year
- Calculate favicon hash for SHODAN☆78Updated last month
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆38Updated 3 years ago
- Nuclei Templates☆16Updated last month
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆25Updated last year
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆17Updated 11 months ago
- ☆51Updated last month