SAJIDAMINE / booksLinks
☆15Updated last year
Alternatives and similar repositories for books
Users that are interested in books are comparing it to the libraries listed below
Sorting:
- ☆53Updated 3 weeks ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆128Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆81Updated 6 months ago
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆63Updated last year
- ☆13Updated 5 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆87Updated last year
- ☆19Updated last year
- ☆27Updated 2 years ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆50Updated 9 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆192Updated 2 months ago
- My Private Bug Hunting Methodology☆305Updated 8 months ago
- ☆52Updated last year
- ☆212Updated last year
- ☆24Updated 2 years ago
- Notes created for preparation of EJPTv2☆216Updated 2 years ago
- ☆19Updated last year
- A collection of notes for bug bounty hunting☆256Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated last year
- All Solutions☆151Updated last year
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆84Updated 8 months ago
- Bug Bounty Tools used on Twitch - Recon☆305Updated 11 months ago
- Reverse Engineering 4 Fun & Profit☆15Updated 2 months ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆21Updated 8 months ago
- Bug Bounty Platforms☆25Updated 9 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆17Updated last year
- Just a part of my private notes☆89Updated last year
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆12Updated 8 months ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆58Updated 9 months ago
- This repo about how to start in Pen-Testing Fields☆28Updated 3 years ago
- Here you can find mostly all disclosed h1 reports☆27Updated 3 years ago