![:electron: :electron:](https://github.githubassets.com/images/icons/emoji/electron.png)
-
08:36
(UTC +05:30) - @J3rry1729
Highlights
Block or Report
Block or report J3rry-1729
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable SSRF candidates.
Real Cyber Security Interview Questions for Various Job Roles
This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.
The EXCLUSIVE Collection of 38,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
i will upload more templates here to share with the comunity.
Learning Vim and Vimscript doesn't have to be hard. This is the guide that you're looking for đź“–
PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]
dwisiswant0 / gfx
Forked from tomnomnom/gfA wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.
This repo is a helpful starting point for those interested in exploring the world of Android hacking and bug bounties. The resources mentioned have personally assisted me.
Burp Suite Certified Practitioner Exam Study
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to …
These are my checklists which I use during my hunting.
Useful Google Dorks for WebSecurity and Bug Bounty
This script grab public report from hacker one and make some folders with poc videos
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for diff…
A curated list of various bug bounty tools
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
RepositĂłrio criado com intuito de reunir templates da ferramenta Nuclei dentro do contexto Brasil