Skip to content
View randomstranger007's full-sized avatar

Block or report randomstranger007

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.

Python 2,198 389 Updated Jul 14, 2024

A collection of various awesome lists for hackers, pentesters and security researchers

106,849 10,012 Updated Jan 18, 2025

Reverse Engineer's Toolkit

Inno Setup 5,165 537 Updated May 1, 2025

This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.

2,801 558 Updated Sep 17, 2024

Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature

4,063 1,014 Updated Jul 31, 2024

Automated All-in-One OS Command Injection Exploitation Tool

Python 5,629 918 Updated Feb 14, 2026

File upload vulnerability scanner and exploitation tool.

Python 3,300 517 Updated May 8, 2025

😱 A curated list of amazingly awesome OSINT

24,837 3,420 Updated Feb 4, 2026

A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.

3,643 591 Updated Nov 23, 2025

"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.

Python 5,554 795 Updated Feb 8, 2025

一个想帮你总结所有类型的上传漏洞的靶场

PHP 4,122 825 Updated Jun 26, 2023

Find broken links, missing images, etc within your HTML.

JavaScript 2,067 307 Updated Jan 8, 2024

📚 A collection of useful resources for building RESTful HTTP+JSON APIs.

4,002 542 Updated Dec 20, 2025

Collection of methodology and test case for various web vulnerabilities.

7,022 1,924 Updated Jun 25, 2025

Ressources for bug bounty hunting

1,901 591 Updated Dec 1, 2022

🛡️ Awesome Cloud Security Resources ⚔️

2,355 347 Updated Nov 8, 2024

Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.

OCaml 14,168 872 Updated Feb 18, 2026

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…

Python 12,725 2,670 Updated Feb 17, 2026

Simple file dump utility for Android

Shell 106 16 Updated Jul 6, 2018

This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on…

HTML 177 57 Updated Dec 27, 2025

🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻

7,209 1,000 Updated May 27, 2024

This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location

1,360 237 Updated Jan 24, 2021

Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥

Python 7,363 1,163 Updated Aug 28, 2025

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

206,672 12,439 Updated Nov 19, 2024

This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports

3,643 650 Updated Feb 18, 2026

Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.

750 118 Updated Apr 12, 2022

this html file creates a csrf poc form to any http request.

JavaScript 283 101 Updated Dec 14, 2022

Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.

C 3,006 666 Updated Oct 26, 2017

UNIX-like reverse engineering framework and command-line toolset

C 23,109 3,167 Updated Feb 17, 2026
Next