Emad Youssef's Projects
Step-by-step guide on how to create a GPG key on keybase.io, adding it to a local GPG setup and use it with Git and GitHub.
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Python code to automatically expend your LinkedIn network based on your interest. ONLY FOR EDUCATIONAL PURPOSES. PLEASE DO NOT MISUSE IT.
List of major web + mobile browser user agent strings. +1 Bonus script to scrape :)
Collection of Scripts for shodan searching stuff.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A Fuzzer for OpenRedirect issues
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Tool to try multiple paths for PHPunit RCE CVE-2017-9841
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
S3 bucket enumerator
Subdomain Takeover tool written in Go
These are the regexes that power truffleHog
Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passwords.
A lists of words based on common web directory and file names lists of words based on common web directory and file names. These wordlists are for Web security testing purpose.
Some of shortcut icon to minimize time when you want to open run specific app inside wsl distro
XSS Bypass