ElzaGurbanova's Stars
danielmiessler/fabric
fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
robertdavidgraham/masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Gallopsled/pwntools
CTF framework and exploit development library
enaqx/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
rapid7/metasploit-framework
Metasploit Framework
CyberMonitor/APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
fabionoth/awesome-cyber-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
0xbharath/censys-enumeration
A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys
KingOfBugbounty/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
dirtycow/dirtycow.github.io
Dirty COW
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
payloadbox/xss-payload-list
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
payloadbox/sql-injection-payload-list
🎯 SQL Injection Payload List
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
xmendez/wfuzz
Web application fuzzer
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
ahadsuleymanli/BHOS_IT_19_1
course materials for class IT19.1