piyushimself's Stars
ByteByteGoHq/system-design-101
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
portainer/portainer
Making Docker and Kubernetes management easy.
aquasecurity/trivy
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
smicallef/spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
blacklanternsecurity/bbot
The recursive internet scanner for hackers. 🧡
GhostTroops/scan4all
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
devanshbatham/Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
Az0x7/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Ignitetechnologies/BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
CIRCL/AIL-framework
AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project
CyberSecurityUP/Cloud-Security-Attacks
Azure and AWS Attacks
mrwadams/attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
ryh04x/CEH-Exam-Questions
Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test
Aetsu/OffensivePipeline
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
AlbusSec/Penetration-List
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.
LearningKijo/SecurityResearcher-Note
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
faiyazahmad07/xss_vibes
A modern tool written in Python that automates your xss findings.
xnl-h4ck3r/XnlReveal
A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidden elements and enable disabled elements.
jassics/security-interview-questions
Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and so on
x1337loser/Dependency-Confusion
All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)
Wh1t3Rh1n0/pentest-scripts
Miscellaneous scripts for pentesting
Leoid/MatchandReplace
Match and Replace script used to automatically generate JSON option file to BurpSuite
yevh/VulnPlanet
Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)
Zellic/publications
Zellic's audits, publications, and reports
RevoltSecurities/GoogleDorker
GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.
immunefi-team/Bounty_Boosts
Bug reports from Immunefi Bounty Boosts
Mostafa-Elguerdawi/Automation_Bug_Hunting
faiyazahmad07/GET-AUTOMATOR
Automates Arjun and speed up parameter bruteforcing
appsecwarriors/Penetration-Tester-Learning-Hub
Complete guide for your security Analyst Journey