Bug Bounty - Important Books
☆21May 8, 2020Updated 5 years ago
Alternatives and similar repositories for Bug-Bounty---Important-Books
Users that are interested in Bug-Bounty---Important-Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small command-line utility to artificially limit the input rate to STDIN.☆18Feb 14, 2024Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Yet Another Vulnerability Database☆16Jul 23, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- Kernel source tree for Raspberry Pi Foundation-provided kernel builds. Issues unrelated to the linux kernel should be posted on the commu…☆10Updated this week
- word-list, payloads , Resources☆28Oct 17, 2025Updated 6 months ago
- ☆10Apr 2, 2023Updated 3 years ago
- An Android application that detects phishing in incoming texts and alerts the user through notification in real time. The user may also e…☆19Feb 17, 2024Updated 2 years ago
- Example Code Review Exercise☆14Apr 14, 2025Updated last year
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆58Apr 3, 2026Updated 2 weeks ago
- ☆13Feb 14, 2020Updated 6 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,831Dec 14, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Updated this week
- CScorza Web - Insieme di tutti gli strumenti OSINT e Digital Forensics☆25Mar 22, 2026Updated 3 weeks ago
- Wireless Pentest☆18Apr 5, 2018Updated 8 years ago
- New Framework Red Team Operations☆21Jun 7, 2021Updated 4 years ago
- ☆70May 26, 2024Updated last year
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- Collection of some pentesting and bugbounty resources☆49Feb 5, 2022Updated 4 years ago
- HowToLogin is a tool that tests web application login pages for login page vulnerabilities and impelementations.☆22Apr 8, 2026Updated last week
- List of Google dorks to find VDPs and Bug Bounty Programs☆33Jan 3, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆24Oct 12, 2021Updated 4 years ago
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆36Sep 4, 2025Updated 7 months ago
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- ☆18Aug 20, 2025Updated 7 months ago
- ☆33Aug 25, 2021Updated 4 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- ☆31Jun 30, 2025Updated 9 months ago
- Penetration testing course by Z0F.☆53Oct 6, 2021Updated 4 years ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆16Dec 15, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆29Aug 12, 2021Updated 4 years ago
- Vulnerability scanner for Caido☆44Mar 26, 2026Updated 3 weeks ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- Machine Learning Data Fairness and Bias☆14Mar 31, 2026Updated 2 weeks ago
- cyber security mind maps collection☆226Jan 1, 2024Updated 2 years ago
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆22Dec 5, 2023Updated 2 years ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago