djadmin / awesome-securityLinks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆28Updated 9 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 4 years ago
- A list of web application security☆94Updated 5 years ago
- Test Android Application.☆19Updated 9 years ago
- Learning Penetration Testing of Android Applications☆78Updated 7 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆91Updated 4 years ago
- Fast, indexed regexp search over large file trees☆23Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 7 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 8 years ago
- Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.☆125Updated last year
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated last month
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆72Updated last year
- Database to store previously found subdomains☆64Updated 3 weeks ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- ☆42Updated 6 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- ☆18Updated last year
- Intelligence gathering framework☆15Updated 9 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 7 years ago
- A simple reconnaissance framework for bug bounty hunting☆36Updated 4 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆33Updated 4 years ago