j3ssie / the-book-of-secret-knowledge
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆67Updated 2 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge:
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
- BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities☆110Updated last year
- Usefull stuff from around teh internetz☆109Updated 7 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆20Updated 5 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆176Updated last year
- ☆58Updated 4 years ago
- Bug Bounty Dork☆71Updated 3 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆78Updated 5 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆38Updated 6 years ago
- ☆36Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆89Updated 3 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆43Updated 6 years ago
- Repo of useful scripts☆104Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Updated 7 years ago
- The tools I have programmed to help me with bugbounty's☆114Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆51Updated 9 years ago
- subdomain bruteforce list☆101Updated 4 months ago
- ☆191Updated 5 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- A list of web application security☆93Updated 5 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆185Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆106Updated last year
- XSSor is a semi-automatic reflected and persistent XSS detector extension for Burp Suite. The tool was written in Python by Barak Tawily,…☆49Updated 3 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆36Updated 5 years ago
- Brute force AWS bucket finder☆60Updated 2 years ago
- Open Redirect Finder.☆49Updated 8 months ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆98Updated 3 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Web Application recon automation☆124Updated 4 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 4 years ago