Skip to content
View R0X4R's full-sized avatar
🔥
Wake. Eat. Hack. Repeat
🔥
Wake. Eat. Hack. Repeat

Block or report R0X4R

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

All Algorithms implemented in Python

Python 189,082 44,898 Updated Oct 5, 2024

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...

Go 5,461 656 Updated Jul 12, 2024

i will upload more templates here to share with the comunity.

521 99 Updated Apr 17, 2024

Tool to check for dependency confusion vulnerabilities in multiple package management systems

Go 691 89 Updated Aug 19, 2024

Nuclei plugin for BurpSuite

Java 1,178 114 Updated Sep 11, 2024

All about bug bounty (bypasses, payloads, and etc)

5,782 1,131 Updated Sep 8, 2023

Grafana Unauthorized arbitrary file reading vulnerability

Go 350 90 Updated Feb 14, 2023

A repository that includes all the important wordlists used while bug hunting.

1,174 323 Updated Mar 11, 2023

Potentially dangerous files

2,862 487 Updated Sep 24, 2024

A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to …

926 153 Updated Jun 24, 2024

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …

HTML 7,414 1,126 Updated Sep 15, 2024

A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Securit…

Python 357 76 Updated Nov 8, 2022

Quickly analyze and reverse engineer Android packages

Shell 729 165 Updated Dec 21, 2022

🔪 :octocat: Leak git repositories from misconfigured websites

Go 1,544 121 Updated Dec 23, 2022

Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts and gather service information

Python 363 66 Updated Jul 23, 2022

An Instagram Open Source Intelligence Tool - Archive

Python 1,252 222 Updated Jun 8, 2024

Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.

Python 100 23 Updated Sep 27, 2023

Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.

Python 233 58 Updated Apr 27, 2020

Proof-of-concept codes created as part of security research done by Google Security Team.

C++ 1,857 249 Updated Mar 12, 2021