diffway545's Stars
Firebasky/CodeqlLearn
记录学习codeql的过程
ASTTeam/CodeQL
《深入理解CodeQL》Finding vulnerabilities with CodeQL.
c3r34lk1ll3r/StagMan
An helper for mobile applications analysis
Occamsec/CVE-2023-2825
GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0.
linyiLYi/street-fighter-ai
This is an AI agent for Street Fighter II Champion Edition.
ziyuanmohun/JDSRC-Small-Classroom
京东SRC小课堂系列文章
jakejarvis/subtake
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
shmilylty/OneForAll
OneForAll是一款功能强大的子域收集工具
ZephrFish/BugBountyTemplates
A collection of templates for bug bounty reporting
punk-security/dnsReaper
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction
HackJava/HackJava
《Java安全-只有Java安全才能拯救宇宙》Only Java Security Can Save The Universe.
erev0s/VAmPI
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
eslam3kl/SQLiDetector
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
Esonhugh/Attack_Code
文章 Attack Code 的详细全文。安全和开发总是具有伴生属性,尤其是云的安全方向,本篇文章是希望能帮助到读者的云安全入门材料。Full text of the article Attack Code. Security and development always have concomitant attributes, and this is especially true with the security direction of the cloud. This article is an introduction to cloud security that I hope will help readers.
chrislockard/api_wordlist
A wordlist of API names for web application assessments
SentineLabs/AlphaGolang
IDApython Scripts for Analyzing Golang Binaries
dahliaOS/pangolin_desktop
Pangolin Desktop UI shell, designed for dahliaOS, written in Flutter.
crow821/vulntarget
vulntarget靶场系列
six2dez/ipcdn
Check which CDN providers an IP list belongs to
gojue/ecapture
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
KingOfBugbounty/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
CERT-Polska/drakvuf-sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
iamthefrogy/frogy
My subdomain enumeration script. It's unique in the way it is built upon.
ticarpi/jwt_tool
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
bytedance/Elkeid
Elkeid is an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and serverless. It is derived from ByteDance's internal best practices.
stevenvachon/broken-link-checker
Find broken links, missing images, etc within your HTML.
dwisiswant0/findom-xss
A fast DOM based XSS vulnerability scanner with simplicity.
obheda12/GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
TheKingOfDuck/fuzzDicts
Web Pentesting Fuzz 字典,一个就够了。