AppleSky6 / My-Personal-Hacking-Notes
My own personal hacking notes.
☆35Updated 6 years ago
Alternatives and similar repositories for My-Personal-Hacking-Notes:
Users that are interested in My-Personal-Hacking-Notes are comparing it to the libraries listed below
- The project contains multiple shell scripts for automating the tasks during recon.☆173Updated last year
- ☆124Updated 4 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆68Updated 3 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆97Updated 3 years ago
- The tools I have programmed to help me with bugbounty's☆114Updated 5 years ago
- API Pentesting notes.☆96Updated 2 months ago
- How to prepare for OSCP complete guide☆128Updated 5 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆170Updated 3 years ago
- ASN reconnaissance script☆124Updated 11 months ago
- A combined wordlists for files and directory discovery☆117Updated 3 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- Web Application recon automation☆124Updated 4 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆78Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆106Updated last year
- A list of Awesome Bughunting oneliners , collected from the various sources☆64Updated last year
- Bug Bounty Dork☆68Updated 2 years ago
- Shodan subdomain finder☆66Updated 4 years ago
- List of Awesome Red Teaming Resources☆106Updated 6 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆71Updated 3 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆69Updated 6 months ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆164Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆107Updated 7 years ago
- ☆58Updated 3 years ago
- ☆187Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆67Updated 2 years ago