Esc4iCEscEsc/skanuvaty
Dangerously fast DNS/network/port scanner
Language: Rust
#cybersecurity #dns #dns_client #hacking_tools #osint_tool #penetration_testing #penetration_testing_tools #pentest #pentesting #redteam #redteam_tools #rust #rust_lang #scanner #security #security_tools #subdomain_enumeration #subdomain_scanner
Stars: 139 Issues: 6 Forks: 6
https://github.com/Esc4iCEscEsc/skanuvaty
Dangerously fast DNS/network/port scanner
Language: Rust
#cybersecurity #dns #dns_client #hacking_tools #osint_tool #penetration_testing #penetration_testing_tools #pentest #pentesting #redteam #redteam_tools #rust #rust_lang #scanner #security #security_tools #subdomain_enumeration #subdomain_scanner
Stars: 139 Issues: 6 Forks: 6
https://github.com/Esc4iCEscEsc/skanuvaty
GitHub
GitHub - Esc4iCEscEsc/skanuvaty: Dangerously fast DNS/network/port scanner
Dangerously fast DNS/network/port scanner. Contribute to Esc4iCEscEsc/skanuvaty development by creating an account on GitHub.
🔥3
Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
Language: HTML
#bugbounty #bugbounty_writeups #bugbountytips #cve #cve_2022_0337 #cybersecurity #exploit #hacking #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 131 Issues: 0 Forks: 22
https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
Language: HTML
#bugbounty #bugbounty_writeups #bugbountytips #cve #cve_2022_0337 #cybersecurity #exploit #hacking #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 131 Issues: 0 Forks: 22
https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
GitHub
GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera…
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337 - Puliczek/CVE-2022-0337-PoC-Google-Chrom...
👍2
Anof-cyber/APTRS
Automated Penetration Testing Reporting System
Language: Python
#aptrs #django #penetration_testing #pentest_report #pentesting #pentesting_tools #python #reporting
Stars: 170 Issues: 1 Forks: 6
https://github.com/Anof-cyber/APTRS
Automated Penetration Testing Reporting System
Language: Python
#aptrs #django #penetration_testing #pentest_report #pentesting #pentesting_tools #python #reporting
Stars: 170 Issues: 1 Forks: 6
https://github.com/Anof-cyber/APTRS
GitHub
GitHub - APTRS/APTRS: Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline…
Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows effortlessly! - APTRS/APTRS
4ra1n/super-xray
XRAY GUI Starter (Web Vulnerability Scanner)
Language: Java
#pentest_tool #vulnerability_scanners #web_security
Stars: 330 Issues: 12 Forks: 42
https://github.com/4ra1n/super-xray
XRAY GUI Starter (Web Vulnerability Scanner)
Language: Java
#pentest_tool #vulnerability_scanners #web_security
Stars: 330 Issues: 12 Forks: 42
https://github.com/4ra1n/super-xray
GitHub
GitHub - 4ra1n/super-xray: Web漏洞扫描工具XRAY的GUI启动器
Web漏洞扫描工具XRAY的GUI启动器. Contribute to 4ra1n/super-xray development by creating an account on GitHub.
CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
#av #bypass #edr #markdown #mindmap #pentest #redteam
Stars: 661 Issues: 0 Forks: 83
https://github.com/CMEPW/BypassAV
GitHub
GitHub - matro7sh/BypassAV: This map lists the essential techniques to bypass anti-virus and EDR
This map lists the essential techniques to bypass anti-virus and EDR - matro7sh/BypassAV
👍2
JackJuly/linkook
🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.
Language: Python
#footprint #information_gathering #osint #osint_python #osint_tool #pentest_tool #pentesting #sherlock #sherlock_alternative #username_checker #username_search
Stars: 283 Issues: 1 Forks: 20
https://github.com/JackJuly/linkook
🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.
Language: Python
#footprint #information_gathering #osint #osint_python #osint_tool #pentest_tool #pentesting #sherlock #sherlock_alternative #username_checker #username_search
Stars: 283 Issues: 1 Forks: 20
https://github.com/JackJuly/linkook
GitHub
GitHub - JackJuly/linkook: 🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms…
🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username. - JackJuly/linkook
👍1
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
GitHub
GitHub - DosX-dev/Astral-PE: Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64) - DosX-dev/Astral-PE
👍1