DynamicBangla / Bangla-Free-CourseLinks
☆19Updated 3 years ago
Alternatives and similar repositories for Bangla-Free-Course
Users that are interested in Bangla-Free-Course are comparing it to the libraries listed below
Sorting:
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Updated 2 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆88Updated 4 months ago
- log Forenix 🕵️- Your Linux Forensic Artifacts Collector Tool! 🚀☆30Updated last year
- this repository made to help me All Dorking repositories find for one location☆35Updated 5 months ago
- INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 cours…☆63Updated 5 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆97Updated 2 weeks ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Updated 9 months ago
- Collected resources for OSWA preparation.☆24Updated 3 years ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆69Updated 8 months ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Updated 3 weeks ago
- Passive leak enumeration tool.☆260Updated 2 weeks ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆35Updated 4 months ago
- ☆27Updated 3 years ago
- ☆25Updated 3 weeks ago
- ☆14Updated 2 years ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆55Updated last year
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF ver…☆128Updated 3 months ago
- ☆47Updated 11 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆218Updated 4 months ago
- OSCP Exam Cheat Sheet☆51Updated 5 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆76Updated 2 months ago
- ☆16Updated 5 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Updated 3 years ago
- ☆41Updated 2 years ago
- ☆19Updated 2 months ago
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16Updated 9 months ago
- A Powerful Recon Engine☆68Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆116Updated last year
- Analyze Android native `.so` files☆119Updated 6 months ago