j3ssie / the-book-of-secret-knowledgeLinks
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆66Updated 3 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- A powerful admin login page finder in python☆78Updated 7 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆216Updated 5 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆95Updated 7 years ago
- Auto deployment of my VPS☆99Updated 4 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆120Updated last year
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 5 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆188Updated 6 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆92Updated 4 years ago
- Offensive Security / Pentesting Cheat Sheets☆101Updated 7 years ago
- Search engine scraper tool with BASH script.☆83Updated 5 years ago
- Handy bash and python scripts for bug bounty hunting!☆48Updated 4 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆35Updated 8 years ago
- Bug Bounty Dork☆73Updated 3 years ago
- API Key/Token Exploitation Made easy.☆90Updated 4 years ago
- A list of web application security☆94Updated 6 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆108Updated 2 years ago
- Web Application recon automation☆126Updated 4 years ago
- subdomain bruteforce list☆101Updated last year
- List out all of payload for security testing☆23Updated 3 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago
- A place to store my own wordlists, and link to others that are useful☆107Updated last year
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Repo of useful scripts☆105Updated 5 years ago
- This repo is for the Ruby version of EyeWitness☆28Updated 10 years ago
- XSSor is a semi-automatic reflected and persistent XSS detector extension for Burp Suite. The tool was written in Python by Barak Tawily, …☆61Updated 4 years ago
- ☆59Updated 4 years ago