j3ssie / the-book-of-secret-knowledge
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆65Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for the-book-of-secret-knowledge
- ☆36Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆78Updated 5 years ago
- Repo of useful scripts☆104Updated 4 years ago
- The tools I have programmed to help me with bugbounty's☆115Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆90Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆49Updated 9 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆173Updated last year
- Enumerate a target Based off of Nmap Results☆77Updated last year
- Handy bash and python scripts for bug bounty hunting!☆47Updated 3 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆113Updated last month
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆43Updated 5 years ago
- A list of web application security☆92Updated 5 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆19Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆96Updated 6 years ago
- BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities☆107Updated last year
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 4 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 5 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆34Updated 9 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆65Updated last year
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆95Updated 3 years ago
- ☆57Updated last year
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆169Updated 3 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆38Updated 6 years ago
- Web Application recon automation☆123Updated 3 years ago
- Recon Custom WordList Ganerator☆56Updated 4 years ago
- A place to store my own wordlists, and link to others that are useful☆105Updated last year
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆36Updated 7 years ago