A list of interesting payloads, tips and tricks for bug bounty hunters.
created at July 13, 2017, 4:50 p.m.
An Open Source Java Decompiler Gui for Procyon
created at July 11, 2013, 10:57 a.m.
In-depth attack surface mapping and asset discovery
created at July 10, 2018, 4:05 p.m.
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
created at Oct. 12, 2011, 2:26 p.m.
Collection of the cheat sheets useful for pentesting
created at Nov. 29, 2016, midnight
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
created at Sept. 19, 2014, 2:53 p.m.
Fast passive subdomain enumeration tool.
created at March 31, 2018, 9:44 a.m.
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
created at March 9, 2015, 9:16 p.m.
A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
created at June 25, 2017, 3 p.m.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
created at Sept. 25, 2018, 3:17 p.m.
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
created at Feb. 20, 2016, 3:17 p.m.
Java decompiler, assembler, and disassembler
created at Oct. 20, 2012, 1:36 a.m.
An engine to make Tor network your default gateway
created at Sept. 7, 2015, 6:47 p.m.