HICASSPU / Cyber_GenesisLinks
☆11Updated last year
Alternatives and similar repositories for Cyber_Genesis
Users that are interested in Cyber_Genesis are comparing it to the libraries listed below
Sorting:
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Updated 2 years ago
- ☆27Updated last month
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆140Updated last year
- ☆14Updated 9 months ago
- ☆19Updated last year
- ☆23Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆88Updated 10 months ago
- Roadmap for Web Application Penetration Testing | FREE Resources (Not Pirated)☆408Updated 2 years ago
- ☆61Updated 5 months ago
- A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.☆652Updated 3 months ago
- Reverse Engineering 4 Fun & Profit☆23Updated 7 months ago
- ☆27Updated 3 years ago
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆66Updated last year
- This repo will contain POC, demo files, and any links given during the Arab web application penetration testing course.☆521Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Updated 3 months ago
- Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.☆68Updated last year
- ☆18Updated 5 months ago
- WAPTLab - Web Application Penetration Testing Lab☆63Updated 3 weeks ago
- Soc Reources Repo☆33Updated last year
- اشهر كتب الاختراق☆97Updated 2 years ago
- ☆15Updated 2 years ago
- This repository contains a roadmap for preparing for the EJPTv2 exam.☆167Updated last year
- Notes created for preparation of EJPTv2☆265Updated 2 years ago
- ☆20Updated 3 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆339Updated 7 months ago
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆54Updated 8 months ago
- ☆13Updated 3 years ago
- ☆707Updated 4 months ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,698Updated 2 years ago