Pinned Repositories
bruteforce-lists
Some files for bruteforcing certain things.
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
DNS-Wordlists
part of my wordlist to bruteforce DNS to find subdoamains.
git_rce
Exploit PoC for CVE-2024-32002
GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
index.html
keywords
leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
OneForAll
OneForAll是一款功能强大的子域收集工具
Walidhossain010's Repositories
Walidhossain010/DNS-Wordlists
part of my wordlist to bruteforce DNS to find subdoamains.
Walidhossain010/bruteforce-lists
Some files for bruteforcing certain things.
Walidhossain010/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Walidhossain010/git_rce
Exploit PoC for CVE-2024-32002
Walidhossain010/GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
Walidhossain010/HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Walidhossain010/index.html
Walidhossain010/keywords
Walidhossain010/leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Walidhossain010/OneForAll
OneForAll是一款功能强大的子域收集工具
Walidhossain010/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Walidhossain010/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Walidhossain010/writeups
writeups
Walidhossain010/x8
Hidden parameters discovery suite