Highlights
Lists (15)
Sort Name ascending (A-Z)
Starred repositories
Reports from various areas of information security
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
A tool for automatically change the Tor IP address over time.
A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
A curated list of awesome privilege escalation
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Updated 6000 Sql Injection Google Dork 2021
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Command-line program to download image galleries and collections from several image hosting sites
A collection of awesome penetration testing resources, tools and other shiny things
Misc dictionaries for directory/file enumeration, username enumeration, password dictionary/bruteforce attacks
🛡️ Awesome Cloud Security Resources ⚔️
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
List of GREP modifications and alternatives for a variety of purposes
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Collection of publicly available IPTV channels from all over the world
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the most of Netlas.io.
Collection of dorking-related resources. Dorks lists, Cheatsheets, Articles, Databases. Google, Yahoo, Yandex, Bing, Baidu, DuckDuckGo, Brave, Ecosia, Qwant.
Collection of the cheat sheets useful for pentesting
A tool for extract Endpoints, URLs and Secrets from contents