Glyptho's starred repositories
BetterBugBounty
BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!
isXSS-Burp
Passively check for XSS character encodings
extractify
A tool for extract Endpoints, URLs and Secrets from contents
DeHashed-API-Tool
A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresses, and more.
Linux-Incident-Response
practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response
My-Hunting-Methodology-
My Private Bug Hunting Methodology
CloakQuest3r
Uncover the true IP address of websites safeguarded by Cloudflare & Others
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
burpsuite-js-extractor
A simple plugin to export JS files from one or multiple targets
nuclei-ai-extension
Nuclei AI - Browser Extension for Rapid Nuclei Template Generation
android_reversing
android application reversing for ctfs
BugBounty-2.0
Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.
URL-Encode-Injection
URL Encode Injection List
burp-vps-proxy
This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.
unpack-burp
For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)
graphql-wordlist
The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.
Penetration-List
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.