Code Monkey home page Code Monkey logo

Hi there 👋

I am a Hustler, Enterprenuer, security researcher.

  • 🔭 I’m currently working on ...
  • 🌱 I’m currently learning ...
  • 👯 I’m looking to collaborate on ...
  • 🤔 I’m looking for help with ...
  • 💬 Ask me about ...
  • 📫 How to reach me: ...
  • 😄 Pronouns: ...
  • ⚡ Fun fact: ...

@

Attr1b's Projects

hacktricks icon hacktricks

Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.

holytips icon holytips

A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

howtohunt icon howtohunt

Tutorials and Things to Do while Hunting Vulnerability.

intruderpayloads icon intruderpayloads

A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

keyhacks icon keyhacks

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

kingofbugbountytips icon kingofbugbountytips

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..

learn365 icon learn365

This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.

neuron icon neuron

Encrypted chat application in python

nuclei-templates icon nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.

opensearch icon opensearch

OpenSearch is a collection of simple formats for the sharing of search results.

pentest-wiki icon pentest-wiki

PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.

pentesting-bugbounty icon pentesting-bugbounty

This Contains all kind of resources for learning purpose which includes Conference, jobs, Bugbounty/pentesting HelpDesk, How to get started etc.

project-morya icon project-morya

Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in an organized way

project_web3.0 icon project_web3.0

This is a code repository for the corresponding video tutorial. In this video, we're going to build a Web 3.0 React Solidity Blockchain Application

qsreplace icon qsreplace

Accept URLs on stdin, replace all query string values with a user-supplied value

research icon research

Bug Bounty writeups, Vulnerability Research, Tutorials, Tips&Tricks

securityexplained icon securityexplained

SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the community to enable knowledge creation and learning.

sillydaddy-ama icon sillydaddy-ama

Senior Java Developer / Cyber security Researcher “Jack of all trades !” I am a self-taught Bug Bounty Hunter /Cyber Security Enthusiast with a passion for programming and a penchant for learning new technologies. I have been a reliable team-player who envisages and develops production-worthy systems and applications for my clients. After 8 years of being an ardent programmer(JAVA ) , I switched gears to cyber security and became a Bug Bounty Hunter. I have experience working on pentesting labs such as Hackthebox, OSCP labs, Pentesterlab, Tryhackme, Virtualhackinglabs etc. I am excited to leverage my cross-domain knowledge and experience to resolve interesting problems. Twitter :- [https://mobile.twitter.com/sillydadddy] LinkedIn :- [https://www.linkedin.com/in/kishore-k-pai]

sudomy icon sudomy

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

takeover icon takeover

Sub-Domain TakeOver Vulnerability Scanner

tbhm icon tbhm

The Bug Hunters Methodology

text-to-handwriting icon text-to-handwriting

So your teacher asked you to upload written assignments? Hate writing assigments? This tool will help you convert your text to handwriting xD

torghost icon torghost

TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.

vaf icon vaf

Vaf is a cross-platform very advanced and fast web fuzzer written in nim

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.