bittuvamshi's repositories
jwt-hacking-challenges
APIs to practise diverse techniques to hack JWT Signatures
AllForOne
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,
android_application_analyzer
The tool is used to analyze the content of the android application in local storage.
APK-Penetration-testing-Guide
The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who is interested in understanding the security implications of Android devices. We encourage feedback, suggestions, and contributions from the community to help us keep this repository up-to-date and useful.
APKLab
Android Reverse-Engineering Workbench for VS Code
Arsenal
Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty
bittuvamshi
Config files for my GitHub profile.
bbtips
BugBountyTips
BugBlaze
Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties
dll-hijack-by-proxying
Exploiting DLL Hijacking by DLL Proxying Super Easily
fuzzuli
fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
IOSSecuritySuite
iOS platform security & anti-tampering Swift library
karma_v2
β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
personal-security-checklist
π A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
recon
information gathering
rootAVD
Script to root AVDs running with QEMU Emulator from Android Studio
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
sub.Monitor
Self-hosted passive subdomain continous monitoring tool.
Task-Ninja
Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!
tor_ip_switcher
tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.
toxicache
Go scanner to find web cache poisoning vulnerabilities in a list of URLs