🎯 SQL Injection Payload List
-
Updated
Jul 18, 2024
🎯 SQL Injection Payload List
🎯 Command Injection Payload List
🦄 A curated list of the awesome resources about the Vulnerability Research
Subdomain takeover vulnerability checker
Open-source vulnerability disclosure and bug bounty program database
HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Hacker, ready for more of our story ! 🚀
🎯 RFI/LFI Payload List
🔎 shodansploit > v1.3.0
Metasploit Cheat Sheet 💣
large hashcat rulesets generated from real-world compromised passwords
Fuzz Introspector -- introspect, extend and optimise fuzzers
PHP Security Check List [ EN ] 🌋 ☣️
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog post
📡🐧 Linux kernel syscall implementation tracker
Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets
MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.
A curated list of awesome baseband research resources
🌐🐧 Browsable linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Add a description, image, and links to the security-research topic page so that developers can more easily learn about it.
To associate your repository with the security-research topic, visit your repo's landing page and select "manage topics."