Hacking-Notes / Bookmarks
Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delivers customized features for a seamless browsing journey.
☆33Updated 5 months ago
Alternatives and similar repositories for Bookmarks:
Users that are interested in Bookmarks are comparing it to the libraries listed below
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆29Updated 5 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆42Updated 5 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆57Updated 3 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆60Updated last month
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆177Updated 5 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆19Updated this week
- Minimalist notes for CEH-practical Cert.☆31Updated 2 years ago
- Here are some cool and some unpublished Dorks☆70Updated 2 months ago
- ☆51Updated last year
- CompTIA Security+ SY0-601 notes (passed 788 points)☆40Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆68Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆43Updated 3 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆16Updated 7 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆69Updated last month
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆97Updated 10 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆42Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆52Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Some Dorking resources☆34Updated 7 months ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆26Updated 6 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆93Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆14Updated 2 years ago
- Making your own CTF☆26Updated 4 years ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆26Updated 5 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆74Updated 6 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆30Updated 7 months ago
- OWASP based Web Application Security Testing Checklist☆70Updated 8 months ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆16Updated last year