ZishanAdThandar / blogLinks
CTF and Bug Bounty Hunting WriteUps.
☆21Updated last week
Alternatives and similar repositories for blog
Users that are interested in blog are comparing it to the libraries listed below
Sorting:
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated 3 weeks ago
- ☆41Updated last year
- Web Hacking and Red Teaming MindMap☆78Updated last month
- Filter URLs to save your time.☆60Updated 3 years ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 months ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Updated last year
- Chrome extension tool for OSINT & Recon☆57Updated last year
- A fast subdomain takeover tool☆85Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆15Updated 3 months ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Updated 9 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆35Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆51Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 3 years ago
- Discovering Typo Squatting on your domains!☆80Updated last year
- ☆20Updated last year
- Automated tool for domains & Subdomains Gathering☆14Updated last year