Pinned Repositories
ATM
The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available to test, platform, technology stack, versions, plugins, modules, and other variables.
blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
BurpCollaboratorDNSTunnel
A DNS tunnel utilizing the Burp Collaborator
CTFSolutionTypes
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
DNSHarvester
This tool will harvest valid DNS subdomains from a given domain.
project-based-learning
Curated list of project-based tutorials
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
haggard88's Repositories
haggard88/ATM
The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available to test, platform, technology stack, versions, plugins, modules, and other variables.
haggard88/blackhat-arsenal-tools
Official Black Hat Arsenal Security Tools Repository
haggard88/BurpCollaboratorDNSTunnel
A DNS tunnel utilizing the Burp Collaborator
haggard88/CTFSolutionTypes
A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall under. Includes CTF solution categories for web, binary, network, crypto, and others. Please contribute!
haggard88/DNSHarvester
This tool will harvest valid DNS subdomains from a given domain.
haggard88/project-based-learning
Curated list of project-based tutorials
haggard88/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.