Skip to content
View yogsec's full-sized avatar
:octocat:
Focusing
:octocat:
Focusing

Block or report yogsec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
yogsec/README.md

Shimarin
followers stars

WhatsApp Channel Telegram Channel

Hi Hacker!

* Web Security * Open-Source Tools * Wordpress Security * Bug Bounty * Payloads

Top of pokeball


Open!
Screenshot_2022-12-22_at_23 08 11-removebg-preview
Typing SVG

Bottom of pokeball

LinkedIn WhatsApp Channel Lichess Email Telegram Channel

Pinned Loading

  1. Hacking-Tools Hacking-Tools Public

    A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.

    417 90

  2. OneLinerBounty OneLinerBounty Public

    OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their skills and efficiency. Contribute your own tips or use these …

    51 10

  3. BugBoard BugBoard Public

    BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.

    HTML 26 6

  4. API-Pentesting-Tools API-Pentesting-Tools Public

    API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).

    212 32

  5. One-Liner-OSINT One-Liner-OSINT Public

    One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.

    37 15

  6. Physical-Pentesting-Tools Physical-Pentesting-Tools Public

    Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effectiveness of physical security controls.

    81 8