You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+8-1
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,8 @@ Table of Contents
44
44
*https://www.manning.com/books/secret-key-cryptography - A book about cryptographic techniques and Secret Key methods.
45
45
*https://www.manning.com/books/application-security-program-handbook - This practical book is a one-stop guide to implementing a robust application security program.
46
46
*https://www.manning.com/books/cyber-threat-hunting - Practical guide to cyber threat hunting.
*https://github.com/HightechSec/git-scanner git-scanner - A tool for bug hunting or pentesting for targeting websites that have open `.git` repositories available in public
134
136
*[Web Application Exploitation @ Rawsec Inventory](https://inventory.raw.pm/tools.html#title-tools-web-application-exploitation) - Complete list of Web pentesting tools
135
137
*[Cyclops is a novel browser that can detect vulnerability automatically](https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking/) - Cyclops is a web browser with XSS detection feature
138
+
*https://caido.io/ - Web proxy
139
+
*https://github.com/assetnote/kiterunner - API discovery
0 commit comments