magma2's repositories

awesome-oneliner-bugbounty

A collection of awesome one-liner scripts especially for bug bounty tips.

License:MITStargazers:0Issues:0Issues:0

kubernetes-goat

Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.

License:MITStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

HawkScan

Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)

Stargazers:0Issues:0Issues:0

rustls

A modern TLS library in Rust

License:NOASSERTIONStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

Awesome-Bugbounty-Writeups

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

Stargazers:0Issues:0Issues:0

Grapefruit

(WIP) Next generation Passionfruit. Runtime Application Instruments for iOS

License:MITStargazers:0Issues:0Issues:0

GadgetProbe

Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.

License:MITStargazers:0Issues:0Issues:0

BurpSQLTruncSanner

Messy BurpSuite plugin for SQL Truncation vulnerabilities.

Stargazers:0Issues:0Issues:0

awesome-web-security

🐶 A curated list of Web Security materials and resources.

Stargazers:0Issues:0Issues:0

scantron

A distributed nmap / masscan scanning framework

License:Apache-2.0Stargazers:0Issues:0Issues:0

Collabfiltrator

Exfiltrate blind remote code execution output over DNS via Burp Collaborator.

License:GPL-3.0Stargazers:0Issues:0Issues:0

nmapAutomator

A script that you can run in the background!

Stargazers:0Issues:0Issues:0

Cyber-Sec-Resources

An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.

Stargazers:0Issues:0Issues:0

assetfinder

Find domains and subdomains related to a given domain

License:MITStargazers:0Issues:0Issues:0

bettercap

The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.

License:NOASSERTIONStargazers:0Issues:0Issues:0

awesome-reversing

A curated list of awesome reversing resources

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

HackingNeuralNetworks

A small course on exploiting and defending neural networks

License:MITStargazers:0Issues:0Issues:0

crtndstry

Yet another subdomain finder

Stargazers:0Issues:0Issues:0

AllThingsSSRF

This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location

License:MITStargazers:0Issues:0Issues:0

tplmap

Server-Side Template Injection and Code Injection Detection and Exploitation Tool

License:GPL-3.0Stargazers:0Issues:0Issues:0

OWASP-Web-Checklist

OWASP Web Application Security Testing Checklist

Stargazers:0Issues:0Issues:0

DVSA

a Damn Vulnerable Serverless Application

License:GPL-3.0Stargazers:0Issues:0Issues:0

massdns

A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

Language:CLicense:GPL-3.0Stargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:0Issues:0

vulhub

Pre-Built Vulnerable Environments Based on Docker-Compose

Language:ShellLicense:MITStargazers:0Issues:0Issues:0

Responder

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

Practical-Cryptography-for-Developers-Book

Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptography, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA

Language:CSSLicense:MITStargazers:0Issues:0Issues:0