Pinned Repositories
Best-websites-a-programmer-should-visit
:link: Some useful websites for programmers.
bruteforce_lists
this project contains list for bruteforcing stuffs
bugbounty_programs
this is the list of bugbounty programs
burp-bounty-profiles
Burp Bounty profiles
MantraMatch
MantraMatch: A Go-powered tool for security engineers to swiftly identify and verify unknown API keys. It analyzes keys against a comprehensive service database, detecting potential threats and unauthorized access. Enhance your API security posture with rapid assessment of key origins, validity, and associated risks.
one_liner
#bug_bounty_tips
resolver
A high-performance, concurrent DNS resolver tool written in Go. This tool efficiently resolves domain names to IP addresses, handling various URL formats and providing flexible output options.
scripty
Script that automates recon.
sentinelssh
SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.
web-pentesting-checklist
checklist for testing the web applications
harshinsecurity's Repositories
harshinsecurity/web-pentesting-checklist
checklist for testing the web applications
harshinsecurity/scripty
Script that automates recon.
harshinsecurity/burp-bounty-profiles
Burp Bounty profiles
harshinsecurity/sentinelssh
SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.
harshinsecurity/one_liner
#bug_bounty_tips
harshinsecurity/bugbounty_programs
this is the list of bugbounty programs
harshinsecurity/google-dorks
google-dorks
harshinsecurity/MantraMatch
MantraMatch: A Go-powered tool for security engineers to swiftly identify and verify unknown API keys. It analyzes keys against a comprehensive service database, detecting potential threats and unauthorized access. Enhance your API security posture with rapid assessment of key origins, validity, and associated risks.
harshinsecurity/subdomz
All in One Subdomain Enumeration Tool
harshinsecurity/xploitfree-scanner
An Automated Multi-tool Web Application Scanner
harshinsecurity/Awesome-Web3-security
A curated list of resources for learning web3 hacking/Security
harshinsecurity/resolver
A high-performance, concurrent DNS resolver tool written in Go. This tool efficiently resolves domain names to IP addresses, handling various URL formats and providing flexible output options.
harshinsecurity/BountyTricks
harshinsecurity/BurpBounty
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
harshinsecurity/ClickjackPoc
Automated tool to find & created Exploit Poc for Clickjacking Vulnerability
harshinsecurity/DevSecOps
just for testing
harshinsecurity/devsecops-github-actions-all
harshinsecurity/ethereumbook
Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
harshinsecurity/Googleaks
Googleaks is a tool which test web application for the confidential information leakage by the google dorking
harshinsecurity/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
harshinsecurity/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
harshinsecurity/og-aws
📙 Amazon Web Services — a practical guide
harshinsecurity/Open-Source-Intellingence-Resources
Compilation of Resources from TCM's OSINT Course
harshinsecurity/Parth
Heuristic Vulnerable Parameter Scanner
harshinsecurity/private_templates
Private Nuclei Templates
harshinsecurity/random
svg xss image
harshinsecurity/SecurityExplained
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
harshinsecurity/test
vulnerable app
harshinsecurity/uro
declutters url lists for crawling/pentesting
harshinsecurity/vercel-takeover
testing subdomain takeover