0xsl4m / JavaScript-for-Cyber-SecurityLinks
☆13Updated 7 months ago
Alternatives and similar repositories for JavaScript-for-Cyber-Security
Users that are interested in JavaScript-for-Cyber-Security are comparing it to the libraries listed below
Sorting:
- Reverse Engineering 4 Fun & Profit☆18Updated 4 months ago
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆85Updated 7 months ago
- ☆56Updated 2 months ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆133Updated last year
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆33Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated 2 years ago
- ☆19Updated last year
- ☆18Updated 2 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆220Updated 4 months ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆51Updated last month
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆64Updated last year
- ☆15Updated 2 years ago
- ☆22Updated last year
- ☆216Updated last year
- My Private Bug Hunting Methodology☆307Updated 10 months ago
- ☆27Updated 2 years ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆93Updated last month
- ☆11Updated 9 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆99Updated 10 months ago
- A collection of notes for bug bounty hunting☆267Updated 2 years ago
- Notes created for preparation of EJPTv2☆239Updated 2 years ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆177Updated last year
- A resources for who want to learn and get deep into client-side bugs☆303Updated 9 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆334Updated last month
- ☆457Updated last week
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆50Updated 5 months ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆88Updated 7 months ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆12Updated 2 weeks ago
- Roadmap for Web Application Penetration Testing | FREE Resources (Not Pirated)☆366Updated 2 years ago
- A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, inte…☆12Updated this week