djadmin / awesome-securityLinks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆28Updated 9 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- A list of web application security☆94Updated 5 years ago
- Some random scripts. Just trying to be like the cool kids.☆92Updated 6 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Updated 6 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 2 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- The OWASP AppSec Browser Bundle is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre…☆98Updated 11 years ago
- Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.☆125Updated last year
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- ☆19Updated 6 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated last month
- Test Android Application.☆19Updated 9 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆91Updated 3 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- Penetration Testing Checklist☆35Updated 5 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 4 years ago
- Learning Penetration Testing of Android Applications☆78Updated 7 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆27Updated 2 years ago
- A tool for searching a Git repository for interesting content☆103Updated last year
- KeepNote For OSCP Course☆24Updated 5 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆22Updated 5 years ago
- ☆36Updated 5 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 7 years ago