Lists (23)
Sort Name ascending (A-Z)
ActiveDirectoryGeneralInfo
This is general AD information that is not security related.BugBountyAutomationTools
This list is for repos of automation tools that can be used for a bug bounty platformBugBountyResources
This list will contain repos that are dedicated to Bug BountyCellularRepos
CheatsheetRepo
This list is for cheatsheets and other types of documents.Debugging
DockerSolution
This list will contain repos that have a Docker container solution that can be used to utilize the toool.DocumentationRepos
This list will be for repos that would contain documentation for general topics.FlipperZero
FurtherResearchRequired
This list will contain repos and tools that require further research to understand how the tool is written, how it works, and how the output can be used...MachineLearning
MalwareFileRepos
This list contains repos that have malware and other files for research.NetworkRelatedInformation
OWASPTop10
This list will be dedicated to resources related to one of the OWASP top 10.PowerShellGeneralResources
This list will hold repositories that use PowerShell to accomplish a task that is for Windows or Linux, but is not necessarily Security related in nature.PowerShellSecurityFrameworks
This list will be for PentTesting and other Security related repose that are built using Powershell.PythonSecurityFramework
This list will be for repos that are written in Python and are security related frameworks.SecurityToolz
SQLAutomation
WebApplicationBountyTools
This list is for repos that can be used to look for bugs on web applications.WindowsPrivEscalation
This list will be used for stars that are related to Windows Priv Escalations tools or repos.WindowsStars
These stars are repositories related to Windows.XSSandCSFRResources
This list will be for repos that deal with XSS and CSFR bugs. It can be informational, scanners, etc.Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatic SQL injection and database takeover tool
Detectron2 is a platform for object detection, segmentation and other visual recognition tasks.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Impacket is a collection of Python classes for working with network protocols.
CTF framework and exploit development library
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
A paper list of object detection using deep learning.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Fast subdomains enumeration tool for penetration testers
an awesome list of honeypot resources
A swiss army knife for pentesting networks
An advanced memory forensics framework
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
🔥 Web-application firewalls (WAFs) from security standpoint.
PEDA - Python Exploit Development Assistance for GDB
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
The FLARE team's open-source tool to identify capabilities in executable files.
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference