Stars
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
A general collection of information, tools, and tips regarding CTFs and similar security competitions
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
🎯 SQL Injection Payload List
A semi-interactive PHP shell compressed into a single file.
a recon tool that allows searching on URLs that are exposed via shortener services
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
DotDotPwn - The Directory Traversal Fuzzer
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Gospider - Fast web spider written in Go
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
A golang utility to spider through a website searching for additional links.
Collection of methodology and test case for various web vulnerabilities.
A list of resources for those interested in getting started in bug bounties
A list of resources for those interested in getting started in bug bounties inspired from https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports