Dr-404 / WebHacking
This repo contain Myanmar Pentster Community web-hacking class resources and published with education purpose.
☆24Updated 4 months ago
Alternatives and similar repositories for WebHacking:
Users that are interested in WebHacking are comparing it to the libraries listed below
- ☆9Updated last year
- Recon on some public sites☆9Updated last year
- Multithreading loop fuzzing with `ffuf` into your subdomains list with unique results☆28Updated 9 months ago
- ☆19Updated 3 years ago
- ☆21Updated 2 years ago
- ☆4Updated last year
- ☆32Updated 4 years ago
- Config files for my GitHub profile.☆9Updated 2 years ago
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايحتويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Updated 2 years ago
- 𝗥𝗮𝗱𝗵𝗲 is a tool that automatically enumerates subdomains, checks if they are live, and finds "Unauthenticated cache purge" and "Serv…☆6Updated last year
- ☆37Updated last year
- ☆48Updated 5 months ago
- Bug Bounty Platforms☆22Updated 4 months ago
- A powerful reconnaissance tool written in Bash scripting. It can be used to scan networks, gather information about hosts, and identify v…☆16Updated last year
- Auto Recon tool for finding SQLi,XSS,LFi,OpenRedirect☆33Updated last week
- a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM☆9Updated last year
- Hun2race is an automated report generation tool designed for bug hunters and penetration testers.☆13Updated 5 months ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Updated last year
- ☆50Updated 8 months ago
- ☆28Updated 2 years ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆18Updated 2 months ago
- Check List☆77Updated 2 years ago
- ☆15Updated last year
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆18Updated last year
- List of Google dorks to find VDPs and Bug Bounty Programs☆29Updated 2 years ago
- Power of .bashrc and .bash_aliases☆31Updated 2 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Updated last year
- Just a part of my private notes☆74Updated last year