Emad Youssef's Projects
Bash script to automate installation of daily use Progs & Tools and customize your KDE
automate the procedure of 403 response code bypass
this contain the burp pack
sidestore's anisette-v3 compatible server
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
little scripts of bash stuff that i've found handy.
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
Burp Bounty profiles
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.
Automated All-in-One OS command injection and exploitation tool.
Create your Custom Wordlist For Fuzzing
šš¦ DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
The README says it all! Feel free to fork it to create your own README as well š
Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.
List DTDs and generate XXE payloads using those local DTDs.
IP lookup from favicon using Shodan
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
File upload vulnerability scanner and exploitation tool.
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Retrieves basic computer information from specified computers (a Windows PowerShell script).
A tool to fastly get all javascript sources/files
This is Google Phishing page is created for knowledge purpose , And You should Add the Sql data links,
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.