HaxonicOfficial / CyberSec_Resources
Get top quality resources from this repo. (Beginner Specific)
☆13Updated last year
Alternatives and similar repositories for CyberSec_Resources:
Users that are interested in CyberSec_Resources are comparing it to the libraries listed below
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- It contain google dork to find the wsdl file.☆13Updated 4 years ago
- Creating a Database for Mass Recon☆12Updated 4 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Automated Recon Framework☆24Updated 4 years ago
- ShellC0de Generator☆11Updated 3 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- Infosec writeups, Bug bounty tips, Tweets & Many more that are picked from around the world || I personally use it || I try to mend it da…☆15Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Script Recon Bug Bounty☆10Updated 3 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 2 years ago
- CTF problems for the practice of Beginners in Cyber Forensics.☆38Updated last year
- ☆12Updated 4 years ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- ☆10Updated last year
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆13Updated 2 weeks ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Concept:☆11Updated 3 years ago
- Automate email search in HaveIBeenPwned☆11Updated 4 years ago
- Http/Https multi threading checker☆9Updated 4 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago