j3ssie / the-book-of-secret-knowledge
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆66Updated 2 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge:
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- ☆58Updated 4 years ago
- Bug Bounty Dork☆71Updated 3 years ago
- XSSor is a semi-automatic reflected and persistent XSS detector extension for Burp Suite. The tool was written in Python by Barak Tawily,…☆53Updated 4 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆52Updated 9 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆20Updated 5 years ago
- BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities☆111Updated last year
- Enumerate a target Based off of Nmap Results☆78Updated last year
- The project contains multiple shell scripts for automating the tasks during recon.☆175Updated last year
- This script is intended to automate your reconnaissance process in an organized fashion☆39Updated 7 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Updated 3 years ago
- ☆194Updated 5 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Updated 4 years ago
- Repo of useful scripts☆104Updated 4 years ago
- ☆37Updated 5 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆37Updated 5 years ago
- Host Header Injection Scanner☆44Updated 4 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago
- Wwwordlist is a wordlist generator for pentesters and bug bounty hunters. It extracts words from HTML, URLs, JS/HTTP/input variables, quo…☆101Updated last year
- A place to store my own wordlists, and link to others that are useful☆108Updated last year
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- Recon for Department of Defense HackerOne program☆45Updated 6 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 5 months ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆115Updated 5 months ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆90Updated 9 months ago
- ASN reconnaissance script☆125Updated last year