j3ssie / the-book-of-secret-knowledgeLinks
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆66Updated 3 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆215Updated 5 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆119Updated last year
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 6 years ago
- A powerful admin login page finder in python☆79Updated 7 years ago
- Auto deployment of my VPS☆101Updated 4 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆95Updated 7 years ago
- A list of web application security☆94Updated 6 years ago
- Web Application recon automation☆127Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆77Updated 2 years ago
- Shodan subdomain finder☆67Updated 5 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- ☆38Updated 6 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 4 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- Offensive Security / Pentesting Cheat Sheets☆102Updated 7 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Updated 8 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 2 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- API Key/Token Exploitation Made easy.☆91Updated 4 years ago
- A tool for searching a Git repository for interesting content☆106Updated last year
- Passive subdomain enumeration tool with http-probe.☆33Updated 4 years ago
- Repo of useful scripts☆105Updated 5 years ago
- Hacking tools☆148Updated 9 months ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 5 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆188Updated 6 years ago
- Bug Bounty Dork☆73Updated 3 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆93Updated 4 years ago