Lists (1)
Sort Name ascending (A-Z)
Stars
🎓 Path to a free self-taught education in Computer Science!
Nuclei template for CVE-2024-24919
Easily and securely send things from one computer to another 🐊 📦
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions tha…
A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
🤪 A list of funny and tricky JavaScript examples
A book series (2 published editions) on the JS language.
Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable SSRF candidates.
🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️
Obtain GraphQL API schema even if the introspection is disabled
Burp Suite extension that offers a toolkit for testing GraphQL endpoints.
🛰️ Represent any GraphQL API as an interactive graph
graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Qiyana : .py tool for fuzzing directories,params,etc..
This repo is a collection for huge lists merged from every available list on repos and non duplicated
I am collecting all of small hunting/penetrationtesting .sh(Bash) codes/scripts here
Extract URLs, paths, secrets, and other interesting bits from JavaScript
Some creative ideas about my scanner automation :)
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
This repo will contain POC, demo files, and any links given during the Arab web application penetration testing course.
BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.
Playlist: https://www.youtube.com/watch?v=XDuWyYxksXU&list=PLDoPjvoNmBAwy-rS6WKudwVeb_x63EzgS
Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automa…
This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response matches a query via simple text matching or Regex.