Vigilante-Hackers / Project_KiraLinks
The biggest collection of cybersecurity resources
☆13Updated 5 months ago
Alternatives and similar repositories for Project_Kira
Users that are interested in Project_Kira are comparing it to the libraries listed below
Sorting:
- BugSquasher Bug Bounty Tools List☆20Updated 2 years ago
- ☆41Updated last year
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 8 months ago
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆22Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 3 years ago
- Collection of Facebook Bug Bounty Writeups☆29Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆54Updated 2 months ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Updated 2 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆17Updated 6 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆64Updated last month
- ☆48Updated last year
- Minimalist notes for CEH-practical Cert.☆35Updated 2 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Updated 4 years ago
- CEH Practical Resources, Learning, Tutorials | Certified Ethical Hacker☆32Updated 4 years ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆39Updated 2 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 6 months ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆11Updated 8 months ago
- 𝗥𝗮𝗱𝗵𝗲 is a tool that automatically enumerates subdomains, checks if they are live, and finds "Unauthenticated cache purge" and "Serv…☆6Updated last year
- Tools and methods that I personally use for Recon and Exploitations☆40Updated last month
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated 2 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆59Updated 8 months ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆46Updated 4 years ago
- A passive way to find backups/ sensitive information.☆82Updated last month
- ☆18Updated 2 years ago
- ☆78Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 5 months ago
- ☆33Updated 2 months ago