3ls3if / Cybersecurity-NotesLinks
Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
☆33Updated 2 weeks ago
Alternatives and similar repositories for Cybersecurity-Notes
Users that are interested in Cybersecurity-Notes are comparing it to the libraries listed below
Sorting:
- Web Application Penetration Testing☆113Updated last month
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆87Updated 3 weeks ago
- ☆51Updated last year
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆46Updated 3 years ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆136Updated 2 weeks ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆51Updated 2 years ago
- ☆56Updated 2 years ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆82Updated 3 months ago
- This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy.☆96Updated 5 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆64Updated 2 weeks ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆59Updated 2 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆95Updated last year
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆96Updated 3 years ago
- INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. T…☆32Updated 7 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆53Updated last month
- ☆46Updated 2 months ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆77Updated last year
- A passive way to find backups/ sensitive information.☆80Updated 2 weeks ago
- ☆43Updated 3 years ago
- INE Training Notes☆30Updated last month
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆101Updated 2 weeks ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆121Updated this week
- ☆130Updated 2 months ago
- This Repo will help you to prepare better for CEH - Practical Exam☆50Updated this week
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆94Updated last month
- Here you can find mostly all disclosed h1 reports☆25Updated 3 years ago
- ☆65Updated 2 years ago
- ☆20Updated 7 months ago
- OSCP Cheatsheet by Sai Sathvik☆70Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆127Updated 2 weeks ago