Faiz's repositories
BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
DevSecOps
🔱 Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎
ForensicsTools
A list of free and open forensics analysis tools and other resources
google-dorks
Useful Google Dorks for WebSecurity and Bug Bounty
h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
hestiacp---mail
Hestia Control Panel | A lightweight and powerful control panel for the modern web.
How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.
ip-network-security
Network Security - ASA | FTD | ISE | WSA | ESA
ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, etc.
medusa
Binary instrumentation framework based on FRIDA
naabu
A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
offensive-security
Offensive Security
OSCE-Complete-Guide
OSWE, OSEP, OSED
portswigger-websecurity-academy
Writeups for PortSwigger WebSecurity Academy
public-apis
A collective list of free APIs
public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
qark
Tool to look for several security related Android application vulnerabilities
RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
takeover
Sub-Domain TakeOver Vulnerability Scanner
Talon
A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.