JoyGhoshs / NotesYouDontNeedLinks
Some Notes because i am too lazy to search
☆12Updated 4 years ago
Alternatives and similar repositories for NotesYouDontNeed
Users that are interested in NotesYouDontNeed are comparing it to the libraries listed below
Sorting:
- ☆9Updated last year
- Basically a regexp over a GitHub search.☆68Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- OSCP Preperation☆14Updated 3 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆42Updated 2 years ago
- Notes from OSCP, CTF, security adventures, etc...☆60Updated last year
- Better Google Dorking with Dorker.☆33Updated 2 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆27Updated last year
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆31Updated 9 months ago
- Spaghetti - Web Application Security Scanner☆19Updated 7 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 weeks ago
- Yet another web recon tool☆62Updated last year
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 3 years ago
- Filter URLs to save your time.☆60Updated 2 years ago
- Host Header Injection Scanner☆47Updated 4 years ago
- A tool to extract all the urls and paths found in the content of a page (js sources included)☆21Updated 2 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆45Updated 10 months ago
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆15Updated 7 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆17Updated last year
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- My personal repository☆12Updated 6 months ago
- ☆85Updated 7 years ago
- This repository contains all my penetration testing study notes, penetration testing tools, scripts, techniques, tricks and also many scr…☆9Updated 7 months ago
- Python Tools For Checking Subdomain TakeOver Vulnerbility☆16Updated last year
- A Python based scanner uses shodan-internetdb to scan the IP.☆31Updated 3 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Updated 3 years ago