Skip to content
View R0X4R's full-sized avatar
🔥
Wake. Eat. Hack. Repeat
🔥
Wake. Eat. Hack. Repeat

Block or report R0X4R

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

All Algorithms implemented in Python

Python 194,052 45,614 Updated Nov 4, 2024

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...

Go 5,513 659 Updated Jul 12, 2024

i will upload more templates here to share with the comunity.

526 99 Updated Apr 17, 2024

Tool to check for dependency confusion vulnerabilities in multiple package management systems

Go 695 91 Updated Aug 19, 2024

Nuclei plugin for BurpSuite

Java 1,190 115 Updated Sep 11, 2024

All about bug bounty (bypasses, payloads, and etc)

5,835 1,137 Updated Sep 8, 2023

Grafana Unauthorized arbitrary file reading vulnerability

Go 353 89 Updated Feb 14, 2023

A repository that includes all the important wordlists used while bug hunting.

1,196 328 Updated Mar 11, 2023

Potentially dangerous files

2,880 487 Updated Oct 28, 2024

A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to …

934 155 Updated Jun 24, 2024

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …

HTML 7,481 1,131 Updated Oct 30, 2024

A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Securit…

Python 360 77 Updated Nov 8, 2022

Quickly analyze and reverse engineer Android packages

Shell 737 165 Updated Dec 21, 2022

🔪 :octocat: Leak git repositories from misconfigured websites

Go 1,548 121 Updated Dec 23, 2022

Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts and gather service information

Python 363 66 Updated Jul 23, 2022

An Instagram Open Source Intelligence Tool - Archive

Python 1,267 224 Updated Jun 8, 2024

Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.

Python 100 23 Updated Sep 27, 2023

Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.

Python 234 58 Updated Apr 27, 2020

Proof-of-concept codes created as part of security research done by Google Security Team.

C++ 1,859 248 Updated Mar 12, 2021