djadmin / awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆28Updated 9 years ago
Alternatives and similar repositories for awesome-security:
Users that are interested in awesome-security are comparing it to the libraries listed below
- A list of web application security☆94Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 4 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆22Updated 4 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Updated 6 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 6 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆21Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- This script is intended to automate your reconnaissance process in an organized fashion☆40Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 2 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 5 years ago
- A tool for searching a Git repository for interesting content☆104Updated last year
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆90Updated 3 years ago
- Fast, indexed regexp search over large file trees☆23Updated 5 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Usefull stuff from around teh internetz☆110Updated 7 years ago
- ☆58Updated 4 years ago
- ☆12Updated 7 years ago
- Shodan Port Scanner☆43Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago