Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start
☆16Oct 4, 2017Updated 8 years ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jul 19, 2017Updated 8 years ago
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆19Jun 2, 2017Updated 8 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆16Mar 17, 2018Updated 8 years ago
- A high-performance DNS stub resolver for bulk lookups☆24Jun 23, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bucrowd LevelUp 2017 virtua…☆25Jul 15, 2017Updated 8 years ago
- Ease-of-use extension for Web Application penetration testing☆23Jun 20, 2017Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆29Feb 29, 2016Updated 10 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆49Jan 19, 2019Updated 7 years ago
- ios source grepper☆42May 4, 2017Updated 9 years ago
- Taktiksel Bug Hunting Yöntemleri☆47Apr 28, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆33Jul 1, 2018Updated 7 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆35Aug 3, 2020Updated 5 years ago
- A python script that finds endpoints in JavaScript files☆47Sep 5, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆20Dec 8, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- In-depth DNS Enumeration and Network Mapping☆36Mar 10, 2019Updated 7 years ago
- Usefull stuff from around teh internetz☆115Oct 30, 2017Updated 8 years ago
- ASN reconnaissance script☆29Jun 14, 2020Updated 5 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆45Jun 30, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Mar 20, 2023Updated 3 years ago
- ☆103May 26, 2019Updated 6 years ago
- Awesome cloud enumerator☆43Sep 12, 2020Updated 5 years ago
- Tool to scrape LinkedIn☆99Mar 20, 2017Updated 9 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆21Mar 11, 2025Updated last year
- Finds all public bug reports on reported on Hackerone☆98Dec 13, 2015Updated 10 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆117Jul 21, 2017Updated 8 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 11 years ago
- ☆117May 25, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Dec 10, 2023Updated 2 years ago
- A collection of web pages, vulnerable to command injection flaws☆182Mar 5, 2023Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆166Mar 20, 2018Updated 8 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A (partial) TLS 1.3 implementation in Java.☆14Apr 18, 2026Updated 2 weeks ago
- Wordlists compiled from Bible verses☆23May 12, 2022Updated 3 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago