Block or Report
Block or report dslusser
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
🕵️♂️ All-in-one OSINT tool for analysing any website
Burp Plugin to Bypass WAFs through the insertion of Junk Data
Collection of methodology and test case for various web vulnerabilities.
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
Know the dangers of credential reuse attacks.
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
An insane list of all dorks taken from everywhere from various different sources.
PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges required )
This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots.
Automatic SQL injection and database takeover tool
CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef
YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js
A library for parsing .DS_Store files and extracting file names
JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.
An open-source alternative to Ngrok, designed to serve production traffic and be simple to host (particularly on Kubernetes)
HTTP Request Smuggling Detection Tool
A modern tool written in Python that automates your xss findings.
A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods…
A Magisk/KernelSU module that automatically adds user certificates to the system root CA store
Automatically look for paramater reflections in the HTTP response