magma2's repositories
awesome-oneliner-bugbounty
A collection of awesome one-liner scripts especially for bug bounty tips.
kubernetes-goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
HawkScan
Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
rustls
A modern TLS library in Rust
Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Grapefruit
(WIP) Next generation Passionfruit. Runtime Application Instruments for iOS
GadgetProbe
Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
BurpSQLTruncSanner
Messy BurpSuite plugin for SQL Truncation vulnerabilities.
awesome-web-security
🐶 A curated list of Web Security materials and resources.
scantron
A distributed nmap / masscan scanning framework
Collabfiltrator
Exfiltrate blind remote code execution output over DNS via Burp Collaborator.
nmapAutomator
A script that you can run in the background!
Cyber-Sec-Resources
An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.
assetfinder
Find domains and subdomains related to a given domain
bettercap
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
awesome-reversing
A curated list of awesome reversing resources
HackingNeuralNetworks
A small course on exploiting and defending neural networks
crtndstry
Yet another subdomain finder
AllThingsSSRF
This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location
tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
OWASP-Web-Checklist
OWASP Web Application Security Testing Checklist
DVSA
a Damn Vulnerable Serverless Application
massdns
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
Practical-Cryptography-for-Developers-Book
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptography, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA