Faiz's starred repositories
Scrapegraph-ai
Python scraper based on AI
Udemy-Red-Team-Hacking-Course
Active Directory Pentesting Full Course - Red Team Hacking
Gf-Patterns
GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
PentestTools
Awesome Pentest Tools Collection
Awesome-WAF
🔥 Web-application firewalls (WAFs) from security standpoint.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
hackerone-reports
Top disclosed reports from HackerOne
vulnerable-code-snippets
Twitter vulnerable snippets
secure-code-review-checklist
A starter secure code review checklist
Penetration-List
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.
can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
eBPF-Guide
eBPF (extended Berkeley Packet Filter) Guide. Learn all about the eBPF Tools and Libraries for Security, Monitoring , and Networking.
CVE-2023-43261
CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption
Bug-bounty-Writeups
Repository of Bug-Bounty Writeups
GDA-android-reversing-Tool
the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption, and encryption, etc.