Coder Social home page Coder Social logo

Abdul Sayyad's Projects

altdns icon altdns

Generates permutations, alterations and mutations of subdomains and then resolves them

bbht icon bbht

A script to set up a quick Ubuntu 17.10 x64 box with tools I use.

bug-bounty-dorks icon bug-bounty-dorks

List of Google Dorks for sites that have responsible disclosure program / bug bounty program

bugbountydorks icon bugbountydorks

This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place

d4rkxss icon d4rkxss

A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF

fuzzdb icon fuzzdb

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

gf icon gf

A wrapper around grep, to help you grep for things

jfscan icon jfscan

JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting abilities to discover information about services. Generate report.

kingofbugbountytips icon kingofbugbountytips

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..

learn365 icon learn365

This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.

reconftw icon reconftw

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

sqltinj icon sqltinj

Automation: Bash script wrapper to find and verify time base sql injection

subdomz icon subdomz

All in One Subdomain Enumeration Tool

trishul icon trishul

Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.

trufflehog icon trufflehog

Searches through git repositories for high entropy strings and secrets, digging deep into commit history

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.