SNOWDEN's repositories
afrog
A Vulnerability Scanning Tools For Penetration Testing
BypassPro
对权限绕过自动化bypass的burpsuite插件
ChatGPT_DAN
ChatGPT DAN, Jailbreaks prompt
Cloudmare
Cloudflare, Sucuri, Incapsula real IP tracker.
copy-as-yara
This is a little plugin to copy disassembly in a way that is usable in YARA rules!
Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Discounted-Udemy-Course-Enroller
A script/software for automatically enrolling/joining 100% discounted Udemy courses for free. Get Paid Udemy courses for free with just a few clicks.
hackerone-reports
Top disclosed reports from HackerOne
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
httpx
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
jsleak
jsleak is a tool to find secret , paths or links in the source code during the recon.
JSpector
A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues
katana
A next-generation crawling and spidering framework.
label-studio
Label Studio is a multi-type data labeling and annotation tool with standardized output format
MemProcFS
MemProcFS
Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
mindsdb
A low-code Machine Learning platform to help developers build #AI solutions
OSINT-FORENSICS-MOBILE
Tools OSINT MOBILE
pymeta
Pymeta will search the web for files on a domain to download and extract metadata. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
RedNeuron
RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾
skipper
An HTTP router and reverse proxy for service composition, including use cases like Kubernetes Ingress
SteaLinG
The SteaLinG is an open-source penetration testing framework designed for social engineering
vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
WCE
This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commands through window flags.