Pinned Repositories
403bypasser
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
All-in-one_BugBounty_PDF_bundles
AllThingsSSRF
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
Amass
In-depth Attack Surface Mapping and Asset Discovery
Anonymous
api_wordlist
A wordlist of API names for web application assessments
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Autofill-Web-Form
AutoRecon
Simple shell script for automated domain recognition with some tools
3cr3sc3nt's Repositories
3cr3sc3nt/403bypasser
3cr3sc3nt/Autofill-Web-Form
3cr3sc3nt/AutoRecon
Simple shell script for automated domain recognition with some tools
3cr3sc3nt/axiom
The dynamic infrastructure framework for anybody!
3cr3sc3nt/Best-README-Template
An awesome README template to jumpstart your projects!
3cr3sc3nt/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
3cr3sc3nt/broken-link-checker
Find broken links, missing images, etc within your HTML.
3cr3sc3nt/bruteforce-lists
Some files for bruteforcing certain things.
3cr3sc3nt/bugz-tools
A collection of tools I wrote for bug bounty or hacking and don't mind publishing it :smile:
3cr3sc3nt/bxss
3cr3sc3nt/byob
An open-source post-exploitation framework for students, researchers and developers.
3cr3sc3nt/cloud-ranges
A list of cloud ranges from different providers.
3cr3sc3nt/dirsearch
Web path scanner
3cr3sc3nt/dnsReaper
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
3cr3sc3nt/Garud
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.
3cr3sc3nt/github-search
Tools to perform basic search on GitHub.
3cr3sc3nt/HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
3cr3sc3nt/KingOfBugBountyTips
3cr3sc3nt/Mastering-Go-Second-Edition
Mastering Go Second Edition, published by Packt
3cr3sc3nt/param-miner
3cr3sc3nt/PENTESTING-BIBLE
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
3cr3sc3nt/reconftw
Simple script for full recon
3cr3sc3nt/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
3cr3sc3nt/seeker
Accurately Locate Smartphones using Social Engineering
3cr3sc3nt/SSRF-Testing
SSRF (Server Side Request Forgery) testing resources
3cr3sc3nt/Storm-Breaker
Social engineering tool [Access Webcam & Microphone & Location Finder] With Python
3cr3sc3nt/thc-hydra
hydra
3cr3sc3nt/trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
3cr3sc3nt/warf
WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
3cr3sc3nt/web-fuzz-wordlists
Common Web Managers Fuzz Wordlists