BugHunterID / hacker-roadmap
A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security.
☆20Updated last year
Alternatives and similar repositories for hacker-roadmap:
Users that are interested in hacker-roadmap are comparing it to the libraries listed below
- Web Reconnaissance and Analyst☆21Updated 2 years ago
- Reference list of useful links to learn about programming, networking, hacking, cybersecurity, ctf, bounty bug write-up, and more☆96Updated 4 years ago
- Dios sql injection☆22Updated 4 years ago
- Simple vulnerability labs that created using PHP and MySQL.☆16Updated 2 years ago
- Pentest Wording Database in Bahasa Indonesia.☆12Updated last year
- TCP1P CTF writeup☆33Updated last year
- A simple Ransomware Generator☆47Updated 4 months ago
- Kumpulan Malware yang viral untuk keperluan analisis☆18Updated 2 months ago
- LazyRev for Lazy People☆21Updated last year
- ☆21Updated 2 years ago
- Detect Program Bug Bounty☆37Updated last month
- Deep scan domain and find all possible domain to takeover☆16Updated last year
- Learning source code review, spot vulnerability, find some ways how to fix it.☆26Updated 2 years ago
- Get subdomain list and check whether they are active or not by each response code. Using API by c99.nl☆10Updated 2 years ago
- Material Untuk Belajar Cyber Security.☆51Updated 3 weeks ago
- ☆39Updated last year
- Hacking tools collections. Especially about web hacking. Not all script coded by me. But i upload it here with credit and without modific…☆5Updated 4 years ago
- A collection oneliner scripts for bug bounty☆173Updated 11 months ago
- ☆272Updated 2 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆112Updated 3 weeks ago
- My-Course-Materials☆34Updated last year
- Tutorials written by me.☆45Updated 3 years ago
- Writeups Of CTFlearn Challenges☆16Updated last year
- XSS Bypass☆28Updated last year
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆49Updated 3 years ago
- CTF write-ups RevID.CTF team☆19Updated 4 years ago
- The application consists of several vulnerable web applications that are integrated with Wazuh.☆16Updated last year
- CTF Writeups☆25Updated 6 months ago