Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
-
Updated
May 29, 2024 - Go
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
HackerOne "in scope" domains
Hourly updated database of exploit and exploitation reports
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
Security - Pentesting - Enumeration - Tools and commands
Open source vulnerability DB and triage service.
ARL 资产侦察灯塔系统(可运行,添加指纹,提高并发,升级工具及系统,无限制修改版)ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。Scoop bucket for Penetration Testing and Cybersecurity related tools.
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties
The Official USB Rubber Ducky Payload Repository
OXO is a security scanning orchestrator for the modern age.
Open Source Cloud Native Application Protection Platform (CNAPP)
A programming language exclusively designed for cybersecurity
jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).
Gather and update all available and newest CVEs with their PoC.
Audit your Node version for known CVEs and patches
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
📡 SPR: Open Source, secure, user friendly and fast wifi routers for your home. One wifi password per device. Ad Blocking & Privacy Blocklists. Policy Based Network Access