A curated, high-efficiency directory of powerful tools designed to elevate your bug-bounty workflow.
Real-time global intelligence dashboard — AI-powered news aggregation, geopolitical monitoring, and infrastructure tracking in a unified situational awareness interface
GitNexus: The Zero-Server Code Intelligence Engine - GitNexus is a client-side knowledge graph creator that runs entirely in your browser. Drop in a GitHub repo or ZIP file, and get an interactive knowledge graph wit a built in Graph RAG Agent. Perfect for code exploration
An MCP server plus a CLI tool that indexes local code into a graph database to provide context to AI assistants.
VulHunt is an open-source binary analysis tool that empowers security researchers to detect known and unknown vulnerabilities in POSIX binaries and UEFI firmware. Write simple Lua rules to leverage taint tracking, dataflow analysis, code pattern matching on decompiled code, and cross-architecture support for x86/ARM. Get precise, annotated reports that pinpoint issues, enable LLM-driven triage and hunting, and speed up mitigation for safer software.
Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and educational purposes only.
Burp Suite Community Edition is a free toolkit for web app security testing, offering an intercepting proxy, traffic history, repeater, decoder, and other core tools for hands-on manual assessments.
FoxyProxy is an open-source, advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. No paid accounts are necessary; bring your own proxies or buy from any vendor. The original proxy tool, since 2006.
OpenClaw is an open-source, local-first AI agent that runs on your Mac, Windows, or Linux machine, keeping all data private and under your control. Chat with it via WhatsApp, Telegram, Discord, Slack, or Signal to automate tasks like clearing inboxes, sending emails, managing calendars, running shell commands, and browser actions. Model-agnostic with persistent memory, skills, and enhanced security features, it delivers efficiency for developers and security researchers auditing AI workflows.[1][2][3]
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
Awesome-Hacking curates top security, pentesting, and hacking resources into one place, giving developers and auditors quick access to tools, guides, and research for stronger security work.
Moltbot is a local-first AI agent that runs 24/7 on your hardware, acting as a proactive coding assistant for developers and auditors. It monitors CI/CD pipelines, fixes bugs overnight, creates pull requests, and integrates with 50+ messaging apps like Telegram and Slack. With persistent memory and full system access, it automates workflows securely while keeping your data private—saving hours on repetitive tasks.
frp is a high-performance reverse proxy that exposes internal TCP, UDP, HTTP, and HTTPS services through a secure public endpoint, with auth, encryption, logging, and load balancing for analysis.
Windows Terminal is a fast, tabbed command-line hub for cmd, PowerShell, WSL, and SSH, with profiles, search, and deep customization that streamline development, admin, and security investigation workflows.
Bug Bounty Daily curates the most useful bug bounty articles in one place, helping developers and security researchers stay sharp, learn new techniques, and improve their vulnerability finding skills.
PayloadsAllTheThings is an open-source resource offering a comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing. It helps developers and security researchers quickly identify, exploit, and understand vulnerabilities like XSS, SQL injection, command injection, and file inclusion. The project saves time in audits and supports learning through practical examples used in real-world web security assessments.
Sherlock is an open-source tool that scans 400+ sites to find where a username is registered, giving developers and investigators quick insight into a target’s social media footprint.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Ghidra is an open-source software reverse engineering framework developed by the NSA that helps developers and security researchers analyze and decompile binary code. It offers disassembly, decompilation, scripting, and collaborative features to uncover software behavior, identify vulnerabilities, and analyze malware across multiple platforms. Its extensibility and user-friendly interface make complex reverse engineering accessible and efficient.
clawdbot is a self-hosted AI agent platform that connects chat, tools, and devices, helping developers and security researchers automate workflows and audit complex systems across platforms.
hackingtool is an all‑in‑one ethical hacking suite that unifies popular pentesting, OSINT, and network scanning tools into a single menu-driven interface for faster security audits and research.