RobotBunny's Stars
0xbharath/censys-enumeration
A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys
blaCCkHatHacEEkr/PENTESTING-BIBLE
articles
teja156/stop_phishing
Dheerajmadhukar/4-ZERO-3
403/401 Bypass Methods + Bash Automation + Your Support ;)
devanshbatham/Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
e11i0t4lders0n/SAML-SSO
oxfemale/PENTESTING-BIBLE
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Ignitetechnologies/BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
six2dez/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
daffainfo/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
dwisiswant0/awesome-oneliner-bugbounty
A collection of awesome one-liner scripts especially for bug bounty tips.
KingOfBugbounty/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
d1eanotherday/Hacking-Cheatsheet
In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the box fan.
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
fuzzdb-project/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
inj3ctor-m4/WebHackingNotes
RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists
Fadavvi/Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
teja156/microsoft-teams-class-attender
A bot to attend classes on microsoft teams
0x25/useful
useful pentest note
KathanP19/HowToHunt
Collection of methodology and test case for various web vulnerabilities.
ngalongc/bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
saeidshirazi/awesome-android-security
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
den4uk/andriller
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
Genymobile/scrcpy
Display and control your Android device
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
IOActive/AOSP-DownloadProviderDbDumperSQLiWhere
PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)