NixOS configurations with all the tools you"ll need for penetration testing, bugbounty hunting and general cybersecurity shenanigans. Basically Like Kali Linux, but on NixOS. (Work in Progress)
-
Updated
Jun 9, 2024 - Nix
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
NixOS configurations with all the tools you"ll need for penetration testing, bugbounty hunting and general cybersecurity shenanigans. Basically Like Kali Linux, but on NixOS. (Work in Progress)
[Automated | UpToDate] Daily Dumps of CertStream Certificate Logs Subdomains Data (SAN || CN)
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
herramientas "FLDSMDFR" AUTMATIZACION reconocimiento completo y explotacion de vuln web. "RECOMPENSA DE ERRORES"
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties
📦 1000+ Statically Linked Binaries & Build Scripts for Android (arm64-v8a), Linux (aarch64 | x86-64), Windows (AMD64) :: https://bin.ajam.dev
Real-world infosec wordlists, updated regularly
Community curated list of search queries for various products across multiple search engines.
[Custom || Automated] Curation & Collection of BugBounty Wordlists
Framework for rapid development of offensive security tools
An insane list of all dorks taken from everywhere from various different sources.
Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done through an Ethical Hacking team or similar offensive security team.
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
This repository contains Bug Bounty writeups
The EXCLUSIVE Collection of 37,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
Vulnerable NodeJS Web Application
This repository is dedicated to showcasing a collection of educational videos curated with gratitude for Defronix and my mentor Mr. Nitesh Singh. The content available here features a series of insightful tutorials and discussions on various topics related to cybersecurity.
Subdomains analysis and generation tool. Reveal the hidden!