thebitdoodler's Stars
cybercdh/kitphishr
A tool designed to hunt for Phishing Kit source code
muchdogesec/awesome_threat_intel_blogs
A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.
andpalmier/phishflood
Pollute phishing kits with fake credentials
andpalmier/apkingo
extract info from apk files
andpalmier/seads
Search Engines ADs scanner - spotting malvertising in search engines has never been easier!
isker/neogrok
Neogrok is a frontend for zoekt, a fast and scalable code search engine.
buttondown/shovel
A free tool for learning about a domain's DNS
phish-report/IOK
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
devanshbatham/getresolvers
A simple utility to fetch freshly updated DNS resolvers
thebitdoodler/LetScript
This is a repo for Scripters to contribute helpful scripts for coders and security professionals
Bevigil/BeVigil-OSINT-CLI
bevigil-cli provides a unified command line interface and python library for using BeVigil OSINT API.
streaak/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
iamthefrogy/frogy
My subdomain enumeration script. It's unique in the way it is built upon.
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
LuD1161/HackingSimplified
This is where I share code/material shown in my videos
DamnVulnerableCryptoApp/DamnVulnerableCryptoApp
An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto, without the need to dive deep into the math behind it
projectdiscovery/httpx
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
th3cyb3rc0p/Infosec-Khazana
This is a resourceful treasury for Info-Sec geeks.
KingOfBugbounty/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
devanshbatham/Gorecon
Gorecon is a All in one Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool that every pentester/bughunter might wanna consider into their arsenal
0xInfection/Awesome-WAF
🔥 Web-application firewalls (WAFs) from security standpoint.
m4ll0k/BBTz
BBT - Bug Bounty Tools (examples💡)
The-XSS-Rat/SecurityTesting
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
KathanP19/HowToHunt
Collection of methodology and test case for various web vulnerabilities.
SusmithKrishnan/torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
devanshbatham/ParamSpider
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
apsdehal/awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
mxrch/GHunt
🕵️♂️ Offensive Google framework.