Stars
All Algorithms implemented in Python
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
i will upload more templates here to share with the comunity.
Tool to check for dependency confusion vulnerabilities in multiple package management systems
Nuclei plugin for BurpSuite
All about bug bounty (bypasses, payloads, and etc)
Grafana Unauthorized arbitrary file reading vulnerability
A repository that includes all the important wordlists used while bug hunting.
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to …
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Securit…
Quickly analyze and reverse engineer Android packages
🔪 Leak git repositories from misconfigured websites
Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts and gather service information
An Instagram Open Source Intelligence Tool - Archive
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.
Proof-of-concept codes created as part of security research done by Google Security Team.