Hidden parameters discovery suite written in Rust. The tool helps to ...

This is a repository of resource about Malware techniques. A curated ...

Collection of Event ID ressources useful for Digital Forensics and Incident ...

Automatically install some web hacking/bug bounty tools for your VPS. O.S ...

Striker C2 Striker is a simple Command and Control (C2) program. This project is ...

What are Cloud Security Threats? The high volume of data flowing between ...

Useful Google Dorks for WebSecurity and Bug Bounty My love google ...

Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike! ...

Summary of almost all paid bounty reports on H1 Public Bug ...

What is a SOC in cyber security? The function of the ...