Skip to content
View mrvcoder's full-sized avatar
🏡
Working From Home
🏡
Working From Home

Block or report mrvcoder

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Tips and Tutorials for Bug Bounty and also Penetration Tests.

1,451 352 Updated Feb 12, 2024

Convenient JavaScript function that serializes Objects to FormData instances.

JavaScript 374 62 Updated Mar 23, 2024

MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.

JavaScript 168 17 Updated Oct 5, 2024

Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.

OCaml 11,302 662 Updated Mar 11, 2025

一键破解APK签名校验

Java 863 231 Updated Nov 14, 2017

A tool for reverse engineering Android apk files

Java 21,474 3,678 Updated Mar 11, 2025

Dex to Java decompiler

Java 43,119 5,006 Updated Mar 9, 2025

Hidden parameters discovery suite

Rust 1,795 161 Updated Sep 8, 2024

Quickly discover exposed hosts on the internet using multiple search engines.

Go 2,534 219 Updated Feb 5, 2025

Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.

Python 494 80 Updated Mar 8, 2025

webrecon

2 Updated Jan 18, 2025

How to implement Stripe without going mad

4,206 209 Updated Feb 7, 2025

🌍 Real-time 3D visualization of Nano cryptocurrency networks - Watch live transactions fly across an interactive globe with 🚀 SpaceX-inspired animations

TypeScript 590 41 Updated Feb 25, 2025

An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability

855 116 Updated Dec 31, 2021

Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure DevOps, GitHub and GitLab.

Python 272 16 Updated Feb 6, 2025

CeWL is a Custom Word List Generator

Ruby 2,147 277 Updated Oct 28, 2024

A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods for identifying various bugs. This guide aims to help bug h…

30 6 Updated Nov 11, 2024
TypeScript 1,308 16 Updated Dec 21, 2024

The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the contr…

Python 12,036 2,397 Updated Mar 11, 2025

World's fastest and most advanced password recovery utility

C 22,150 3,009 Updated Aug 16, 2024

The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!

Shell 4,148 660 Updated Sep 30, 2024

A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.

Go 560 42 Updated Mar 10, 2025

A stunning, functional and responsive retractable sidebar for Next.js built on top of shadcn/ui.

TypeScript 1,492 199 Updated Nov 19, 2024

Malware Configuration And Payload Extraction

Python 2,238 438 Updated Mar 11, 2025

403/401 Bypass Methods + Bash Automation + Your Support ;)

Shell 1,414 268 Updated Jun 6, 2022
Next
Showing results