Daniel Púa (devploit) devploit
- Málaga, Spain
- https://danielpua.dev/
- @devploit
- in/daniel-pua
WebHacking
A collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me
Find domains and subdomains related to a given domain
🐶 A curated list of Web Security materials and resources.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to ...
重生之我在安全行业讨口子系列,分享在安全行业讨口子过程中,SRC、项目实战的有趣案例
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.
Here I gather all the resources about hacking that I find interesting
jsleak is a tool to find secret , paths or links in the source code during the recon.
XSS payloads designed to turn alert(1) into P1
Automatic SSRF fuzzer and exploitation tool
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
This Burp Suite extension is designed to bypass Web Application Firewalls (WAFs) by padding HTTP requests with dummy data.
Bypass Paywalls web browser extension for Chrome and Firefox.
Burp Extension to add additional functionality for pentesting websocket based applications
File upload vulnerability scanner and exploitation tool.
A fast tool to scan CRLF vulnerability written in Go
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.