Stars
View HTTP/HTTPS requests made by any Linux program
A collection of Turbo Intruder scripts.
Embed the Power of Lua into NGINX HTTP servers
Concatenate a directory full of files into a single prompt for use with LLMs
The recursive internet scanner for hackers. 🧡
LLM based autonomous agent that conducts deep local and web research on any topic and generates a long report with citations.
fabric is an open-source framework for augmenting humans using AI. It provides a modular framework for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
Differential fuzzing REPL for HTTP implementations.
📡 PoC auto collect from GitHub.
🐬 A collection of awesome resources for the Flipper Zero device.
80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.
Opensource assets and vulnerability scanning tool
Subdomains analysis and generation tool. Reveal the hidden!
KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
IDA Pro plugin for reconstructing original .proto files from binary.
Prevent Kubernetes misconfigurations from reaching production (again 😤 )! From code to cloud, Datree provides an E2E policy enforcement solution to run automatic checks for rule violations. See our…
CATS is a REST API Fuzzer and negative testing tool for OpenAPI endpoints. CATS automatically generates, runs and reports tests with minimum configuration and no coding effort. Tests are self-heali…
ZKar is a Java serialization protocol analysis tool implement in Go.
Best practices for segmentation of the corporate network of any company
Grafana Unauthorized arbitrary file reading vulnerability