Hacking with the power of checklists.
☆39Dec 18, 2018Updated 7 years ago
Alternatives and similar repositories for hacker-checklist
Users that are interested in hacker-checklist are comparing it to the libraries listed below
Sorting:
- ☆13Feb 26, 2021Updated 5 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆14Jul 18, 2025Updated 7 months ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- Fetch Javascript sourcemaps, bounty hunter style☆42May 21, 2023Updated 2 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.☆12Jun 24, 2018Updated 7 years ago
- These are payloads to hunt for various bugs in web applications. from SQLi, xss, RCE to path traversal and more with XSS and fuzzing.☆11Oct 3, 2020Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- Every Nuclei template that has ever appeared on Github☆36Jun 2, 2022Updated 3 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 10 months ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- A simple reconnaissance framework for bug bounty hunting☆37Oct 16, 2020Updated 5 years ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago