YAHYA TOUBALI's repositories
Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
amass
In-depth Attack Surface Mapping and Asset Discovery
awesome-android-security
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
BookmarkHelper
BookmarkHelper
feroxbuster
A fast, simple, recursive content discovery tool written in Rust.
eyeballer
Convolutional neural network for analyzing pentest screenshots
FavFreak
Making Favicon.ico based Recon Great again !
get-all-Recon-tools-for-one-click
Bug Bounty Recon Tools
github-search
A collection of tools to perform searches on GitHub.
hakoriginfinder
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
hakrevdns
Small, fast tool for performing reverse DNS lookups en masse.
HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
katoolin
Automatically install all Kali linux tools
knock
Knock Subdomain Scan
My-Presentation-Slides
Collections of Orange Tsai's public presentation slides.
nipejs
Detects JavaScript leaks via regex patterns
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
sheye
Opensource assets and vulnerability scanning tool
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
sql-injection-payload-list
🎯 SQL Injection Payload List
trufflehog
Find and verify credentials
w-colab
Free Rdp windows with google colab
Windows-11-VPS
😎😘 Free Windows 11 VPS for 1 Hour ! Easy Method!