Alperen
alpernae
Application Security Researcher
Languages
Repos
17
Stars
103
Forks
30
Top Language
Python
Loading contributions...
Top Repositories
AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovative extension harnesses the power of AI to automate vulnerability detection, provide intelligent analysis, and assist security professionals in identifying complex security issues.
Auth Mutator is a Burp Suite extension that helps you experiment with mutated authentication requests while keeping the original traffic intact. It applies user-defined replace rules, removes authentication artefacts for unauthenticated probes, and highlights noteworthy responses so you can quickly spot interesting behaviour.
Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into your security journey, you'll find tools, notes, and scripts here that I've gathered and created along the way.
GoFuzz is a simple and efficient open-source fuzzing scanner designed to discover directories and files on a target web server or application.
Notes+ is a Burp Suite extension designed to provide a seamless note-taking experience directly within Burp Suite. It allows security testers and developers to efficiently create, manage, and organize their findings, observations, and thoughts using Markdown, with a live HTML preview.
This bookmarklet scans the current webpage for endpoints and displays them in an overlay. The overlay provides a "Close" button to remove it from the view.
Repositories
17AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovative extension harnesses the power of AI to automate vulnerability detection, provide intelligent analysis, and assist security professionals in identifying complex security issues.
A Model Context Protocol (MCP) server for interacting with the Intigriti bug bounty platform's Researcher API. This enables AI assistants like Claude to help security researchers manage their bug bounty programs, submissions, and research workflow.
An MCP (Model Context Protocol) server that connects Claude, Claude codex and other mcp clients to the HackerOne Hackers API.
Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into your security journey, you'll find tools, notes, and scripts here that I've gathered and created along the way.
No description provided.
Auth Mutator is a Burp Suite extension that helps you experiment with mutated authentication requests while keeping the original traffic intact. It applies user-defined replace rules, removes authentication artefacts for unauthenticated probes, and highlights noteworthy responses so you can quickly spot interesting behaviour.
Notes+ is a Burp Suite extension designed to provide a seamless note-taking experience directly within Burp Suite. It allows security testers and developers to efficiently create, manage, and organize their findings, observations, and thoughts using Markdown, with a live HTML preview.
Typst-based CV/resume generator for academics and engineers, YAML to PDF
A Python client for interacting with Google's Gemini Live API with real-time audio, video capabilities, and advanced configuration management.
No description provided.
No description provided.
No description provided.
This bookmarklet scans the current webpage for endpoints and displays them in an overlay. The overlay provides a "Close" button to remove it from the view.
GoFuzz is a simple and efficient open-source fuzzing scanner designed to discover directories and files on a target web server or application.
No description provided.
Script that installs/configures a Dovecot, Postfix, Spam Assassin, OpenDKIM Debian web server
crap-crypt Linux is a ransomware malware that can run on Linux systems. It is a software that finds the victim's user files and encrypts these files and uploads the generated decryption key to the attacker's server.