Good resources about web security that I have read.
☆27Jul 23, 2023Updated 2 years ago
Alternatives and similar repositories for WDIR
Users that are interested in WDIR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆55Dec 21, 2020Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11May 15, 2020Updated 5 years ago
- BugBounty_CheatSheet☆265May 11, 2023Updated 2 years ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆78Dec 3, 2023Updated 2 years ago
- Log4j for nuclei☆69Dec 13, 2021Updated 4 years ago
- A wordlist for brute forcing directories / files☆10Jul 7, 2015Updated 10 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆36Dec 8, 2023Updated 2 years ago
- Git folder digger, I'm sure it's worthwhile stuff.☆38Jan 10, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆35Feb 1, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- A FireBase DataBase TakeOver Tool along with POC Generator☆35Sep 16, 2021Updated 4 years ago
- This repo includes my analysis of some public reports.☆55Sep 22, 2020Updated 5 years ago
- Fastest recursive HTTP fuzzer, like a Ferrari.☆91Nov 27, 2020Updated 5 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Akgulyzer; komut satiri rastgele metin uretici ve encoder.☆20Feb 10, 2015Updated 11 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- ☆12Jun 15, 2022Updated 3 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- Python package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)☆12Apr 29, 2025Updated 10 months ago
- ☆14Oct 1, 2021Updated 4 years ago
- CTF and Bug Bounty Hunting WriteUps.☆21Feb 20, 2026Updated last month
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228☆17Dec 15, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- A Payload Injector for bugbounties written in go☆70Jul 18, 2020Updated 5 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- Resources I consider useful for security research of web applications☆61Dec 15, 2020Updated 5 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago