Pinned Repositories
003Recon
Some tools to automate recon - 003random
A-Red-Teamer-diaries
Red_teaming/Pentesting notes and experiments for a real world engagements
AdoBot
Open-source android spyware
ANDRAX-Mobile-Pentest
ANDRAX The first and unique Penetration Testing platform for Android smartphones
AndTroj
A tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
anonymouse
Python script to send anonymous email using anonymouse.org
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
DeepSearch
DeepSearch - Advanced Web Dir Scanner
email2phonenumber
A OSINT tool to obtain a target's phone number just by having his email address
prosecurity's Repositories
prosecurity/ATM_Fraud_Analysis
ATM Fraud and Crime Detection Methodology
prosecurity/Payloads
prosecurity/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
prosecurity/attackbook
Penetration Tester Gitbook
prosecurity/Awesome-Asset-Discovery
List of Awesome Asset Discovery Resources
prosecurity/AWSBucketDump
Security Tool to Look For Interesting Files in S3 Buckets
prosecurity/Best-README-Template
An awesome README template to jumpstart your projects!
prosecurity/Brute_Force
prosecurity/Bug-Bounty-Tools
Find sub domain take overs and XSS on all domains on hackerone and bugcrowd.
prosecurity/BugBountyTemplate
A simple Cherry Tree template that can be used to organize bug bounties
prosecurity/cc-reader
CC reader
prosecurity/CCrawlDNS
This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.
prosecurity/CVE-2019-2107
CVE-2019-2107
prosecurity/Diggy
Extract endpoints from apk files.
prosecurity/IPOsint
Discovery IP Address of the target
prosecurity/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
prosecurity/LinkFinder
A python script that finds endpoints in JavaScript files
prosecurity/OSCP-Cheatsheets
OSCP Cheatsheets
prosecurity/pentest-guide
Penetration tests cases, resources and guidelines.
prosecurity/Pentesting-1
prosecurity/Phishing-Simulation
Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment
prosecurity/PyRai
MIRAI botnet in python3
prosecurity/ReconCobra
Ultimate Recon Software for Information Gathering
prosecurity/ReverseAPK
Quickly analyze and reverse engineer Android packages
prosecurity/Shell-Backdoor
Shell yg kami bikin selalu berantakan, namun tak begitu berantakan seperti nasib iduplu
prosecurity/the-art-of-command-line
Master the command line, in one page
prosecurity/WNMAP
This is a cheatsheet for mastering nmap
prosecurity/Wordlist
Wordlists for Bug Bounty
prosecurity/WordLists-20111129
A lists of words based on common web directory and file names lists of words based on common web directory and file names. These wordlists are for Web security testing purpose.
prosecurity/xkyuby
All IN One Tool : exploiters/checker/grabbers/senders/scanners