Take it like a gift

Vampi
Vampi

Vulnerable REST API with OWASP top 10 vulnerabilities for security testing.

CloudScraper
CloudScraper

Tool to enumerate targets in search of cloud resources.

ipsourcebypass
ipsourcebypass

Bypass IP source restrictions using HTTP headers.

FireBounty
FireBounty

The ultimate Vulnerability Disclosure Policy and Bug Bounty list!

HARpwn
HARpwn

Designed to streamline the extraction and sanitization of HARTokens from HTTP archives.

JNDI-Injection-Exploit
JNDI-Injection-Exploit

Generates JNDI links can start several servers to exploit JNDI Injection vulnerabilities.

l0phtcrack
l0phtcrack

Crack Windows passwords from hashes.

fibratus
fibratus

Modern tool for Windows kernel exploration and tracing with a focus on security.

ezXSS
ezXSS

An easy way for penetration testers and bug bounty hunters to test (blind) XSS.

Java Deserialization Scanner
Java Deserialization Scanner

All-in-one plugin for the detection and exploitation of Java deserialization vulnerabilities.

FinalRecon
FinalRecon

All In One Web Recon.

kerbrute
kerbrute

Bruteforce and enumerate Active Directory accounts through Kerberos pre-authentication.

Evil SQL Client
Evil SQL Client

Interactive .NET SQL console client with enhanced SQL Server discovery/access/exfiltration features.

EDD
EDD

Ultimate domain enumeration tool.

Legitify
Legitify

Detect misconfigurations and security risks across GitHub and GitLab assets.