sderosiaux / checklists
All checklists
☆26Updated 5 years ago
Alternatives and similar repositories for checklists:
Users that are interested in checklists are comparing it to the libraries listed below
- Scan secrets from Continuous Integration Build Logs☆52Updated 5 years ago
- Personal Notes.☆10Updated 6 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆67Updated 3 years ago
- HTML form parser for humans.☆78Updated 4 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆16Updated 6 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 2 years ago
- Some random scripts. Just trying to be like the cool kids.☆91Updated 6 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- A static website template for security pages.☆50Updated 6 months ago
- Extract relative urls from a heap snapshot☆85Updated 3 years ago
- FockCache - Minimalized Test Cache Poisoning☆110Updated 5 years ago
- A collective list of public JSON APIs for use in security. Contributions welcome☆24Updated 5 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆32Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- Fetch the details of assets hosted on AWS.☆86Updated last year
- AWS Security Checks☆37Updated 7 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆105Updated 5 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆71Updated 3 years ago
- Bug bounty bot for channel☆16Updated 2 years ago
- ☆12Updated 4 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- All in one port scanning script.☆67Updated 4 years ago
- A tool to fetch and verify the existence of endpoints from the Wayback Machine API.☆52Updated 4 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- A tool for searching a Git repository for interesting content☆102Updated last year
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆99Updated last year
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆42Updated 2 years ago