Pinned Repositories
2ndOrder
Chrome extension to inspect and find domains that don't resolve or have expired
3rdparty-services
PHP tool to test 3rd party service validity
api_wordlist
A wordlist of API names for web application assessments
aquatone
A Tool for Domain Flyovers
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Helping-Hands
Penetration Testing / OSCP Biggest Reference Bank
jexboss
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Crypto-Breaker's Repositories
Crypto-Breaker/AadhaarSearchEngine
Find Aadhaar cards thanks to Google
Crypto-Breaker/adminMongo
adminMongo is a Web based user interface (GUI) to handle all your MongoDB connections/databases needs.
Crypto-Breaker/AllVideoPocsFromHackerOne
This script grab public report from hacker one and make some folders with poc videos
Crypto-Breaker/awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
Crypto-Breaker/awesome-google-vrp-writeups
🐛 A list of writeups from the Google VRP Bug Bounty program
Crypto-Breaker/awesome-sec-talks
A collected list of awesome security talks
Crypto-Breaker/Awesome-WAF
🔥 A curated list of awesome web-app firewall (WAF) stuff.
Crypto-Breaker/B1tMass
Multiple Weaknesses Checking for Mass Subdomains
Crypto-Breaker/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Crypto-Breaker/bounty-targets-data
This repo contains hourly-updated data dumps of Hackerone/Bugcrowd scopes that are eligible for reports
Crypto-Breaker/consul-pwn
Make a Consul Agent Grab AWS IAM ROLE keys
Crypto-Breaker/Crypto-Breaker
Config files for my GitHub profile.
Crypto-Breaker/Deserialization-Vulnerabilities
Demo and Slides from OWASP Lithuania chapter meeting #10
Crypto-Breaker/hackerone-reports
Top disclosed reports from HackerOne
Crypto-Breaker/HostHunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Crypto-Breaker/Interlace
Easily turn single threaded command line applications into fast, multi threaded ones with CIDR and glob support.
Crypto-Breaker/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Crypto-Breaker/learn365
This repo is about @harshbothra_ 365 days of learning Tweet & Mindmap collection
Crypto-Breaker/medium-unlimited
A browser extension to read medium.com articles for free without membership.
Crypto-Breaker/nosqlclient
Cross-platform and self hosted, easy to use mongodb management tool - Formerly Mongoclient
Crypto-Breaker/notes-on-security
Crypto-Breaker/pentest
A place for pentest documents and related activities
Crypto-Breaker/poc_CVE-2018-1002105
PoC for CVE-2018-1002105.
Crypto-Breaker/pocsuite3
pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.
Crypto-Breaker/routeros
RouterOS Bug Hunting Materials
Crypto-Breaker/SecurityExplained
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
Crypto-Breaker/Slides
Slides from various talks that I've given over the years
Crypto-Breaker/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers.
Crypto-Breaker/vulns
Named vulnerabilities and their practical impact
Crypto-Breaker/XSRFProbe
The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.