Pinned Repositories
31-days-of-API-Security-Tips
This challenge is Inon Shkedy's 31 days API Security Tips.
API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
API-SecurityEmpire
API Security Projecto aims to present unique attack & defense methods in API Security field
api_wordlist
A wordlist of API names for web application assessments
Arjun
HTTP parameter discovery suite.
awesome-api-security
A collection of awesome API Security tools and resources.
bugbounty-cheatsheet-1
A list of interesting payloads, tips and tricks for bug bounty hunters.
CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
NarSi-04A0's Repositories
NarSi-04A0/31-days-of-API-Security-Tips
This challenge is Inon Shkedy's 31 days API Security Tips.
NarSi-04A0/API-SecurityEmpire
API Security Projecto aims to present unique attack & defense methods in API Security field
NarSi-04A0/Arjun
HTTP parameter discovery suite.
NarSi-04A0/awesome-api-security
A collection of awesome API Security tools and resources.
NarSi-04A0/CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
NarSi-04A0/HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
NarSi-04A0/HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
NarSi-04A0/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
NarSi-04A0/Open-Source-Nuclei-Templates-Downloader
Script that download 37+ open source nuclei templates
NarSi-04A0/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
NarSi-04A0/Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
NarSi-04A0/web-pentesting
Repo oriented to web app testing
NarSi-04A0/WordList
NarSi-04A0/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
NarSi-04A0/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
NarSi-04A0/Application-Security
Resources for Application Security including Web, API, Android, iOS and Thick Client
NarSi-04A0/AttackSurfaceMapper
AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
NarSi-04A0/bugbounty
Bugbounty Resources
NarSi-04A0/dark-web-osint-tools
OSINT Tools for the Dark Web
NarSi-04A0/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
NarSi-04A0/h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
NarSi-04A0/Infrastructure-Pentesting-Checklist
NarSi-04A0/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
NarSi-04A0/linux-commands-for-basic-hacking
someone needs help
NarSi-04A0/log4jake
NarSi-04A0/Mail-Header-Analysis
Analyzing email headers can provide valuable information for identifying potentially malicious domains
NarSi-04A0/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
NarSi-04A0/tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
NarSi-04A0/Wazuh-Rules
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
NarSi-04A0/Web-Application-Pentest-Checklist