Take it like a gift

Can I take over XYZ?
Can I take over XYZ?

A list of services and how to claim (sub)domains with dangling DNS records.

ScrapedIn
ScrapedIn

Scrape LinkedIn without API restrictions for data reconnaissance.

prototype-pollution-exploits
prototype-pollution-exploits

Prototype Pollution exploits collection.

Prowler
Prowler

Open Source Security tool to perform Cloud Security best practices

RsaCtfTool
RsaCtfTool

RSA multi-attacks tool: uncypher data from a weak public key and try to recover a private key.

CRYPTOHACK
CRYPTOHACK

A fun, free platform for learning modern cryptography.

PyCript
PyCript

Bypass client-side encryption using custom logic for testing with Python and NodeJS.

RouterSploit
RouterSploit

Exploitation framework for embedded devices.

DivideAndScan
DivideAndScan

Divide full port scan results and use it for targeted Nmap runs.

git-all-secrets
git-all-secrets

Capture all the git secrets by leveraging multiple open source git searching tools.

Race The Web
Race The Web

Tests for race conditions in web applications.

SSRFmap
SSRFmap

Automatic SSRF fuzzer and exploitation tool.

xray
xray

Security assessment tool that supports common web security issue scanning and custom PoC.

egressbuster
egressbuster

Check egress filtering and identify if ports are allowed to automatically spawn a shell.

Enlightn
Enlightn

Your performance & security consultant, an artisan command away.