-
ENSIBS
- 127.0.0.1
Highlights
- Pro
Lists (14)
Sort Name ascending (A-Z)
🧠 A.I
📠 AD
Bug Bounty
C2-Sandbox
⚙️ DevSecOps
🕹️ Embarqué
🍎 MacOs
📱Mobile Security
🔍 OSINT
🍚 Rices
My favorites Linux .dotfiles📒 Study
Resources for study and learn new skills and earn new certifications!⚔️ Tools
Cybersecurity tools I commonly use🎰 Utils
🔧 WebApp
My favorite templates to start creating WebAppsStarred repositories
Work in progress...
Various wordlists FR & EN - Cracking French passwords
Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams
Python sandbox escape wiki + payload generator
Automatise l'émargement des élèves de l'Université Bretagne Sud sous Docker grâce à l'API de PlanningSup
⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Electron JS Browser To Find XSS Vulnerabilities Automatically
This OS is Hollow like a famous Knight. and like me (it mean it'll be minimal) | Moved into : github.com/Auri-OS
SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/
Scanning APK file for URIs, endpoints & secrets.
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
Open Source Alternative to Vercel, Netlify and Heroku.
VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and adversary simulation, VolchockC2 focuses on flexibility, stea…
Run Windows apps on 🐧 Linux with ✨ seamless integration
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
CTFNote is a collaborative tool aiming to help CTF teams to organise their work.
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty
A fast tool to scan CRLF vulnerability written in Go
👾👾 Genymotion_ARM_Translation Please enjoy!
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…