Stars
Local File Inclusion To Remote Command Execution (PoC)
A curated list of web3Security materials and resources For Pentesters and Bug Hunters.
A list of interesting payloads, tips and tricks for bug bounty hunters.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
In-depth attack surface mapping and asset discovery
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
This repository collects offensive and audit tools to assess the actual security of smart contracts and blockchain
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.
Exchange Server support tools and scripts
Awesome Burp Suite Resources. 400+ open source Burp plugins, 400+ posts and videos.
All Security Resource Collections Repos That I Published.
Course materials for Modern Binary Exploitation by RPISEC
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Capture handshakes of nearby WiFi networks automatically
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspber…
Kali Linux ARM build scripts
An ArchLinux based distribution for penetration testers and security researchers.