#
Lists (32)
Sort Name ascending (A-Z)
Anonymity
22 repositories
Attack Surface Mapping
4 repositories
Automatic Exploitation
8 repositories
Automation Frameworks
16 repositories
Bug Bounty
48 repositories
Bug Bounty Help
11 repositories
C2 Frameworks
8 repositories
cool misc
40 repositories
cryptography
3 repositories
CTF Toolkits
5 repositories
DNS Toolkits
2 repositories
don't-reinvent-the-wheel
1 repository
Master Toolkit
125 repositories
must-have
1 repository
Nuclei Templates
3 repositories
OSINT Toolkit
10 repositories
Passwords
2 repositories
Phishyfish
1 repository
rats
Recon
45 repositories
reinventwheel
1 repository
repos for new instances/computer
58 repositories
Reverse Shell
3 repositories
SQL Injection
10 repositories
target list
2 repositories
Vulnerability Scanners
10 repositories
WafBypass
1 repository
WebApp Offensive Framework
30 repositories
webappsec
2 repositories
WIFI Hacking
11 repositories
Wordlist Toolkit
19 repositories
XSS Toolkit
27 repositories
Starred repositories
1
star
written in BlitzBasic
Clear filter
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.