Giter VIP home page Giter VIP logo

14thGhost's Projects

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

bounty-targets-data icon bounty-targets-data

This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports

bugbounty-resources icon bugbounty-resources

A list of resources for those interested in getting started in bug bounties inspired from https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

duplicut icon duplicut

Remove duplicates from MASSIVE wordlist, without sorting it (for dictionnary-based password cracking)

gitdorker icon gitdorker

A Python program to scrape secrets from GitHub through usage of a large repository of dorks.

how-web-works icon how-web-works

What happens behind the scenes when we type www.google.com in a browser?

howtohunt icon howtohunt

Tutorials and Things to Do while Hunting Vulnerability.

intruderpayloads icon intruderpayloads

A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

lfisuite icon lfisuite

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

pentesting-bible icon pentesting-bible

Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.

reconnote icon reconnote

Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters

safeeyes icon safeeyes

Protect your eyes from eye strain using this simple and beautiful, yet extensible break reminder

say-cheese icon say-cheese

Minimal javascript library for integrating a webcam and snapshots into your app.

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

subdomainizer icon subdomainizer

A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.

subrake icon subrake

A Subdomain Enumeration and Validation tool for Bug Bounty and Pentesters.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.