Nexsus1985's Stars
es3n1n/no-defender
A slightly more fun way to disable windows defender + firewall. (through the WSC api)
SigmaHQ/sigma
Main Sigma Rule Repository
infosec-au/altdns
Generates permutations, alterations and mutations of subdomains and then resolves them
acheong08/ChatGPT
Reverse engineered ChatGPT API
f/awesome-chatgpt-prompts
This repo includes ChatGPT prompt curation to use ChatGPT better.
lencx/ChatGPT
🔮 ChatGPT Desktop Application (Mac, Windows and Linux)
ameenmaali/urldedupe
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
abysshint/tor-control-panel
Windows GUI Client for Tor Expert Bundle
PortSwigger/BChecks
BChecks collection for Burp Suite Professional and Burp Suite Enterprise Edition
Maximus5/ConEmu
Customizable Windows terminal with tabs, splits, quake-style, hotkeys and more
SaadAhmedx/Subdomain-Takeover
haccer/subjack
Subdomain Takeover tool written in Go
punk-security/dnsReaper
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
melbinkm/Acunetix-Bulk-Scan-Scheduler
Simple Bulk Scan Scheduler for Acunetix in PHP
codewatchorg/Burp-AnonymousCloud
Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities
ChmaraX/forensix
Google Chrome forensic tool to process, analyze and visualize browsing artifacts
clarkvoss/AEM-List
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
LOLBAS-Project/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
kleiton0x00/Advanced-SQL-Injection-Cheatsheet
A cheat sheet that contains advanced queries for SQL Injection of all types.
henriksb/ExtensionSpoofer
Spoof file icons and extensions in Windows
imran-parray/Mind-Maps
Mind-Maps of Several Things
hackerscrolls/SecurityTips
Viralmaniar/BigBountyRecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
lobuhi/byp4xx
40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...
SmeegeSec/Burp-Importer
Burp Suite Importer - Connect to multiple web servers while populating the sitemap.
screetsec/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Subn0x/subzer0
A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443
sting8k/BurpSuite_403Bypasser
Burpsuite Extension to bypass 403 restricted directory
NetSPI/Burp-Extensions
Central Repo for Burp extensions