Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.
☆79Dec 30, 2021Updated 4 years ago
Alternatives and similar repositories for SourceCodeReview
Users that are interested in SourceCodeReview are comparing it to the libraries listed below
Sorting:
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆10Feb 26, 2021Updated 5 years ago
- XSS Finder Via SSTI☆56Sep 14, 2023Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 3 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Some of the gf patterns which i use☆44Jan 19, 2022Updated 4 years ago
- Hacking and Securing Java☆79Jan 24, 2019Updated 7 years ago
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Pentest Q&A trick written in Vietnamese☆11May 16, 2019Updated 6 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 2 months ago
- ☆13Jul 27, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- ☆13Oct 24, 2024Updated last year
- Review of AWAE.OSWE☆31Mar 12, 2022Updated 3 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 5 years ago
- Common Security Interview Questions with Answers☆31Jul 4, 2023Updated 2 years ago
- Supertruder but better☆31Mar 10, 2023Updated 2 years ago
- Common Bugs from low to critical Level☆15May 9, 2021Updated 4 years ago
- ☆12Jan 30, 2025Updated last year
- ☆15Apr 5, 2023Updated 2 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Aug 19, 2025Updated 6 months ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- A OWASP Based Checklist With 80+ Test Cases☆157Oct 26, 2022Updated 3 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago