Hacking-Notes / BookmarksLinks
Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delivers customized features for a seamless browsing journey.
☆49Updated 10 months ago
Alternatives and similar repositories for Bookmarks
Users that are interested in Bookmarks are comparing it to the libraries listed below
Sorting:
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆53Updated 10 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆52Updated 10 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆72Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆51Updated this week
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆213Updated 10 months ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆27Updated 2 years ago
- ☆24Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- A Personal Collection of Infosec Dorks☆211Updated 2 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆19Updated 2 years ago
- :')☆47Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Updated 4 years ago
- capNcook - a dark web exploration tool☆122Updated last year
- ☆40Updated 10 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆101Updated 2 years ago
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆43Updated 4 years ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Updated last year
- ☆78Updated 2 years ago
- List of GREP modifications and alternatives for a variety of purposes☆134Updated last month
- My Gitbook CyberSec Notes☆20Updated 3 months ago
- Here are some cool and some unpublished Dorks☆81Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆64Updated 9 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆99Updated 11 months ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆108Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- ☆147Updated 8 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆92Updated 3 months ago
- CompTIA Security+ SY0-601 notes (passed 788 points)☆58Updated last year