InfoSecWarrior / Linux-Essentials
Covering fundamental Linux concepts, from basic commands to advanced topics like string processing, file management, user and group management, networking, process control, firewall configuration, task scheduling, and more.
☆10Updated last week
Alternatives and similar repositories for Linux-Essentials:
Users that are interested in Linux-Essentials are comparing it to the libraries listed below
- ☆18Updated last month
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆71Updated last month
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆95Updated last week
- Monta tu laboratorio para preparar la certificación eCPPT☆18Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆110Updated 3 months ago
- ☆20Updated 5 months ago
- A quick bug bounty guide for beginners☆58Updated last month
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆39Updated last year
- Kali for Penetration Testers, by EC-Council☆12Updated 2 years ago
- ☆105Updated 2 months ago
- eJPTv2 Cheatsheet for the exam, with commands and tools shown in the course.☆54Updated 2 years ago
- Tool for automate bug hunting process 🔍 --> 🍭☆39Updated 8 months ago
- ☆63Updated 2 years ago
- Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)☆148Updated 5 months ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆78Updated 2 months ago
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆64Updated 2 weeks ago
- ☆54Updated 2 years ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆43Updated 6 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 7 months ago
- Bug Bounty Tools used on Twitch - Recon☆295Updated 7 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆134Updated 6 months ago
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆162Updated 8 months ago
- Here you can find mostly all disclosed h1 reports☆12Updated 6 years ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆10Updated 10 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆244Updated 3 weeks ago
- Here you can find mostly all disclosed h1 reports☆25Updated 3 years ago
- Made for My Personal Learning.☆28Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆178Updated 4 months ago
- INE/eLearnSecurity Web Application Penetration Tester (eWPTv2) Notes☆90Updated 10 months ago
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆202Updated last year