A list of interesting payloads, tips and tricks for bug bounty hunters.
created at July 13, 2017, 4:50 p.m.
In-depth attack surface mapping and asset discovery
created at July 10, 2018, 4:05 p.m.
An Open Source Java Decompiler Gui for Procyon
created at July 11, 2013, 10:57 a.m.
Collection of the cheat sheets useful for pentesting
created at Nov. 29, 2016, midnight
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
created at Oct. 12, 2011, 2:26 p.m.
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
created at Sept. 19, 2014, 2:53 p.m.
A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
created at June 25, 2017, 3 p.m.
Fast passive subdomain enumeration tool.
created at March 31, 2018, 9:44 a.m.
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
created at March 9, 2015, 9:16 p.m.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
created at Sept. 25, 2018, 3:17 p.m.
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
created at Feb. 20, 2016, 3:17 p.m.
Java decompiler, assembler, and disassembler
created at Oct. 20, 2012, 1:36 a.m.
An engine to make Tor network your default gateway
created at Sept. 7, 2015, 6:47 p.m.
A cross-version Python bytecode decompiler
created at Dec. 13, 2015, 5:46 a.m.