SAJIDAMINE / booksLinks
☆15Updated last year
Alternatives and similar repositories for books
Users that are interested in books are comparing it to the libraries listed below
Sorting:
- ☆49Updated 9 months ago
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆58Updated last year
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆46Updated 7 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆83Updated last year
- ☆19Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆76Updated 3 months ago
- ☆27Updated 2 years ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆120Updated last year
- ☆52Updated last year
- ☆17Updated last year
- ☆13Updated 3 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Rust☆38Updated last year
- Nakerah-lab☆66Updated last month
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated last year
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆11Updated 6 months ago
- Bug Bounty Roadmap☆32Updated last year
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆58Updated 7 months ago
- Bug Bounty Platforms☆25Updated 7 months ago
- Study Notes for the OSCP Content You will find notes from various resources like OSCP from Nakerah Network, Practical Ethical Hacking(PEH…☆59Updated last year
- This repo about how to start in Pen-Testing Fields☆26Updated 2 years ago
- This is a resource for anyone looking to learn bug hunting and provides guidance during the study and learning phase.☆26Updated 10 months ago
- ☆20Updated 9 months ago
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆17Updated 2 months ago
- Penetration Testing and Offensive Security Interview Questions☆161Updated 3 years ago
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆49Updated last month
- ☆24Updated 2 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆127Updated 2 weeks ago
- A resources for who want to learn and get deep into client-side bugs☆62Updated 5 months ago
- Soc Reources Repo☆17Updated 7 months ago
- ☆23Updated last year