aungkyawminnaing_nolan's repositories
amass-1
In-depth Attack Surface Mapping and Asset Discovery
appsensor
A toolkit for building self-defending applications through real-time event detection and response
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-standard-notes
A curated list of tools and information relating to Standard Notes.
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
coreruleset
OWASP ModSecurity Core Rule Set (Official Repository)
dirhunt
Find web directories without bruteforce
ezXSS
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
fuxploider
File upload vulnerability scanner and exploitation tool.
gitrob
Reconnaissance tool for GitHub organizations
hackerone-reports
Top disclosed reports from HackerOne
Hacking
🌐Collate and develop network security, Hackers technical documentation and tools, code.
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
HowToHunt
Tutorials and Things to Do while Hunting Vulnerability.
lazyrecon
This script is intended to automate your reconnaissance process in an organized fashion
massdns
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
OSINT-Framework
OSINT Framework
OWASP-CSRFGuard
OWASP CSRFGuard 3.1.0
pentesterlab-bootcamp
My notes on PentesterLab's Bootcamp series 🕵️
snort-faq
Snort FAQ
subfinder
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
TheHive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Threat-Hunting
Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine
tko-subs
A tool that can help detect and takeover subdomains with dead DNS records
truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose