S0L1tud3's Stars
Ishanoshada/GDorks
Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories )
assetnote/nowafpls
Burp Plugin to Bypass WAFs through the insertion of Junk Data
Mehdi0x90/Web_Hacking
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
projectdiscovery/proxify
A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.
ManojBR105/ARDUINO-SMD-REWORK-STATION
The files required to build the following instructable projects are here:https://www.instructables.com/id/DIY-SMD-REWORK-STATION/
ryanoasis/nerd-fonts
Iconic font aggregator, collection, & patcher. 3,600+ icons, 50+ patched fonts: Hack, Source Code Pro, more. Glyph collections: Font Awesome, Material Design Icons, Octicons, & more
bitquark/shortscan
An IIS short filename enumeration tool
LongSoft/UEFITool
UEFI firmware image viewer and editor
CatAnnaDev/visualstudio2022-2019-2017Key
x64dbg/x64dbg
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
dnSpy/dnSpy
.NET debugger and assembly editor
zapstiko/Hacking-PDF
Here Are Some Popular Hacking PDF
i5nipe/nipejs
Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leaks.
R-s0n/ars0n-framework
A Modern Framework for Bug Bounty Hunting
cheesecakeufo/komorebi
A beautiful and customizable wallpapers manager for Linux
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Findomain/Findomain
The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, multiple API Keys for sources and much more.
bhavesh-pardhi/Wordlist-Hub
Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security enthusiasts during their reconnaissance and vulnerability assessment processes.
zeek/zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
techchipnet/CamPhish
Grab cam shots from target's phone front camera or PC webcam just sending a link.
christophetd/censys-subdomain-finder
⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
zidansec/CloudPeler
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
Az0x7/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Ekultek/WhatWaf
Detect and bypass web application firewalls and protection systems
n0kovo/n0kovo_subdomains
An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.
superhedgy/AttackSurfaceMapper
AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.
nikhil1232/Bucket-Flaws
Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
hahwul/jwt-hack
🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
gwen001/github-subdomains
Find subdomains on GitHub.
ElevenPaths/FOCA
Tool to find metadata and hidden information in the documents.