
Stars
- All languages
- ASP
- Ada
- Assembly
- Astro
- Batchfile
- Bicep
- BitBake
- BlitzBasic
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dart
- Dockerfile
- Emacs Lisp
- F#
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Meson
- Mustache
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Python
- REXX
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scheme
- Shell
- Smarty
- Solidity
- Swift
- TSQL
- TeX
- TypeScript
- V
- VBA
- Vim Script
- Visual Basic
- Vue
- XSLT
- YARA
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Automatic SQL injection and database takeover tool
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
🕵️♂️ Collect a dossier on a person by username from thousands of sites
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the contr…
A swiss army knife for pentesting networks
The recursive internet scanner for hackers. 🧡
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
Automatic CPU speed & power optimizer for Linux
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Reverse engineering and pentesting for Android applications
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Scanning APK file for URIs, endpoints & secrets.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Colored logcat script which only shows log entries for a specific application package.
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
IntelOwl: manage your Threat Intelligence at scale
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A collection of custom security tools for quick needs.
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Automatic SSRF fuzzer and exploitation tool
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing