Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising…
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Interne…
DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your Vul…
Diccionarios de: usuarios, passwords, XSS, ficheros, carpetas, dorks, etc .. ( hackingyseguridad.com )
Open-source vulnerability disclosure and bug bounty program database
Open-source vulnerability disclosure policy templates.
…
An experimental distributed JWT token cracker built using Node.js and ZeroMQ
Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.
Offline Cybersecurity Knowledge Base
🌐 The all-in-one tool, for keeping track of your domain name portfolio. Got domain names? Get Domain Locker!
DOM Clobbering Wiki, Browser Testing, and Payload Generation
DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers …
Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.
Plugin-based scanner that aids security researchers in identifying issues with Drupal, SilverStripe, and WordPress sites. Detects plugins, t…
1. Hack the World using Termux this tool is developed by sabri.zaki for penetration testing using 2. metasploit-framework 3. sqlmap 4. nmap …
INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malici…
An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Elevatio…
Find Email Spoofing Vulnerablity of domains
Enhanced BurpGPT 是一个强大的 Burp Suite 插件。通过分析指定的 HTTP 请求和响应,帮助安全测试人员更快速地发现潜在的安全漏洞。
A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to s…
Standalone man-in-the-middle attack framework that bypasses 2FA by proxying authentication sessions and capturing session cookies. Uses phis…
INE/eLearnSecurity Web Application Penetration Tester (eWPTv2) Notes