Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a variety of resources, notes, and practical projects aimed at enhancing knowledge and skills in identifying and mitigating security vulnerabilities.
☆47Jun 3, 2025Updated 9 months ago
Alternatives and similar repositories for SecToolkit
Users that are interested in SecToolkit are comparing it to the libraries listed below
Sorting:
- ☆10May 6, 2017Updated 8 years ago
- A simple index for HackTheBox machine along with tags☆16Jan 8, 2026Updated last month
- API-Pentesting-Checklist☆25Feb 27, 2023Updated 3 years ago
- ☆91Mar 17, 2025Updated 11 months ago
- ☆28Nov 3, 2024Updated last year
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 2 months ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆29Nov 26, 2024Updated last year
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆234Apr 5, 2025Updated 11 months ago
- ☆14Dec 11, 2025Updated 2 months ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆394May 21, 2025Updated 9 months ago
- 一个实用的特殊手机号字典☆35Oct 13, 2020Updated 5 years ago
- zoomeye客户端 钟馗之眼客户端☆11Feb 15, 2022Updated 4 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 4 months ago
- ☆10Jul 8, 2024Updated last year
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Jan 11, 2025Updated last year
- Learn Python and Ethical Hacking From Scratch, published by Packt☆47Jan 30, 2023Updated 3 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆100Sep 9, 2023Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆93Nov 26, 2024Updated last year
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆753Nov 19, 2025Updated 3 months ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- Synchronize properties from your Obsidian notes with a Markwhen timeline file.☆12Sep 20, 2025Updated 5 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- Code Examples for the Web and Cloud Applications Security Course☆12Feb 23, 2026Updated last week
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year