Harsh kumar's repositories
web-pentesting-checklist
checklist for testing the web applications
burp-bounty-profiles
Burp Bounty profiles
bugbounty_programs
this is the list of bugbounty programs
google-dorks
google-dorks
sentinelssh
SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.
Awesome-Web3-security
A curated list of resources for learning web3 hacking/Security
MantraMatch
MantraMatch: A Go-powered tool for security engineers to swiftly identify and verify unknown API keys. It analyzes keys against a comprehensive service database, detecting potential threats and unauthorized access. Enhance your API security posture with rapid assessment of key origins, validity, and associated risks.
resolver
A high-performance, concurrent DNS resolver tool written in Go. This tool efficiently resolves domain names to IP addresses, handling various URL formats and providing flexible output options.
BurpBounty
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
ClickjackPoc
Automated tool to find & created Exploit Poc for Clickjacking Vulnerability
ethereumbook
Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
Googleaks
Googleaks is a tool which test web application for the confidential information leakage by the google dorking
keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
og-aws
📙 Amazon Web Services — a practical guide
Open-Source-Intellingence-Resources
Compilation of Resources from TCM's OSINT Course
Parth
Heuristic Vulnerable Parameter Scanner
private_templates
Private Nuclei Templates
SecurityExplained
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.
test
vulnerable app
uro
declutters url lists for crawling/pentesting
vercel-takeover
testing subdomain takeover
xploitfree-scanner
An Automated Multi-tool Web Application Scanner