rajat1411's Projects
Proactive, Open source API security ā API discovery, Testing in CI/CD, Test Library with 150+ Tests, Add custom tests, Sensitive data exposure
A collection of android security related resources
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
A curated list of CTF frameworks, libraries, resources and softwares
A collection of various awesome lists for hackers, pentesters and security researchers
š¶ A curated list of Web Security materials and resources.
This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for TheCyberMentor's walkthrough. Please watch his walkthrough if you're confused. Feel free to implement Pull Requests or raise Issues.
recon data for public bug bounty programs (irregular updates)
A list of interesting payloads, tips and tricks for bug bounty hunters.
Damn Vulnerable Web Application Docker container
Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports.
Tools for gathering information and actions forensic
ALL IN ONE Hacking Tool For Hackers
CTF Beginners Guide!!
Tutorials and Things to Do while Hunting Vulnerability.
This repo is about @harshbothra_ 365 days of learning Tweet & Mindmap collection
OSCP
All in One OSCP Preparation Material
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Automating XSS using Bash
Config files for my GitHub profile.
A list of resources for those interested in getting started in bug bounties
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.
Web application fuzzer