Highlights
- Pro
Lists (7)
Sort Name ascending (A-Z)
Starred repositories
This repository contains a mindmap and stepwise resource to get started with Smart Contract Auditing. If you find anything missing or want to update existing resources, feel free to create a pull r…
Discover new target domains using Content Security Policy
Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only
A tool to find cloud buckets from Domains and Subdomains using Google, DNS, Gray Hat Warfare and all might Scraping
SCOPE [Subdomain Cache Observation, Poisoning & Evaluation] is a simple, yet powerful tool designed to help you find and test vulnerabilities in subdomains that might be exposed to cache poisoning …
Amazon AtoZ VET-Flex Bot for warehouse shifts.
A cloned version of the Builders Academy website .
Advanced SQL Injection Techniques for Bug Bounty Hunters
Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
A tool to perform Kerberos pre-auth bruteforcing
This TryHackMe Rooms contains the series wise rooms from Beginner to Expert Level Rooms. If you are new to TryHackMe follow this pathway for great start.
Cracks Apache OFBiz SHA1 hashes. Just something you might want to do....
🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and sensitive files
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Fortune 500 company lists since 1955 in CSV format, mostly parsed using Beautiful Soup