J1NNX26 / resources
A curated list of different pentesting resources
☆29Updated 3 years ago
Alternatives and similar repositories for resources:
Users that are interested in resources are comparing it to the libraries listed below
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆81Updated 3 years ago
- ☆22Updated 3 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆16Updated 3 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆58Updated 2 years ago
- Automated Web Recon Shell Scripts☆51Updated 3 years ago
- ☆83Updated 3 years ago
- ☆94Updated 3 years ago
- ☆44Updated 3 years ago
- ☆50Updated 3 years ago
- Guide to SSRF☆69Updated last year
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 3 years ago
- Summary of almost all paid bounty reports on H1☆40Updated 4 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆48Updated 2 years ago
- Check List☆79Updated 2 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Updated 3 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆32Updated 2 years ago
- ☆52Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Updated 4 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆57Updated 4 years ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆67Updated last year
- Noobish Recon Automation☆21Updated last year
- ☆100Updated last year
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆54Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago