Lists (3)
Sort Name ascending (A-Z)
Stars
The Ninja Tables plugin for WordPress (versions < 4.1.9) contains a critical vulnerability in the AJAX action ninja_table_force_download.
Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)
ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making it very hard to track your online activity, IP address, and l…
b4rdia / HackTricks
Forked from HackTricks-wiki/hacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
An XSS exploitation command-line interface and payload generator.
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps C…
A resources for who want to learn and get deep into client-side bugs
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Hacks for a better google cloud shell experience
Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.
Security Tool to Look For Interesting Files in S3 Buckets
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners
🤗 smolagents: a barebones library for agents that think in code.
Gather and update all available and newest CVEs with their PoC.
Asset inventory of over 800 public bug bounty programs.