Git Product home page Git Product logo

Polling Repo's Projects

bb_rc icon bb_rc

BugBounty_ReportCheck: A little tool to check if a bug bounty report exist with your keyword

bbrecon icon bbrecon

Python library and CLI for the Bug Bounty Recon API

bbscope icon bbscope

Scope gathering tool for HackerOne, Bugcrowd, and Intigriti!

bcscope icon bcscope

Get the scope of your bugcrowd programs

bearerauthtoken icon bearerauthtoken

This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP requests.Furthermore, this solution provides a better approach to solve the problem of Burp suite automated scanning failures when Authorization tokens exist.

beetlebug icon beetlebug

Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters.

behave icon behave

Behave! A monitoring browser extension for pages acting as "bad boi"

beroot icon beroot

Privilege Escalation Project - Windows / Linux / Mac

berserko icon berserko

Burp Suite extension to perform Kerberos authentication

bfac icon bfac

BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.

bgp-search icon bgp-search

A Python wrapper for searching on https://bgp.tools

bhedak icon bhedak

A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout. Only for linux, unix and debian based systems.

bhhb icon bhhb

Tool to view HTTP history exported from Burp Suite Community Edition

bifrost icon bifrost

Objective-C library and console to interact with Heimdal APIs for macOS Kerberos

big-list-of-naughty-strings icon big-list-of-naughty-strings

The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

big-papa icon big-papa

Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication

bigbountyrecon icon bigbountyrecon

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

bigipsecurity icon bigipsecurity

This document describes common misconfigurations of F5 Networks BigIP systems.

billing-hack icon billing-hack

This application allows to impersonate the Google Play Billing service (com.android.vending).

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.