Stonzyy / ORectorLinks
☆11Updated 3 years ago
Alternatives and similar repositories for ORector
Users that are interested in ORector are comparing it to the libraries listed below
Sorting:
- Nakerah-lab☆66Updated 2 months ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆12Updated 7 months ago
- ☆19Updated last year
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆17Updated last week
- ☆52Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆120Updated last year
- ☆406Updated last year
- Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against mal…☆267Updated last week
- ☆15Updated last year
- ☆20Updated 8 months ago
- This repo will contain POC, demo files, and any links given during the Arab web application penetration testing course.☆486Updated 3 years ago
- ☆23Updated last year
- www.sec-down.com☆1Updated 3 weeks ago
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆57Updated last year
- ☆27Updated 2 years ago
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆76Updated 4 months ago
- ☆50Updated 9 months ago
- How to prepare for eJPT Exam☆9Updated 3 years ago
- This is Advance Phishing Tool ! OTP PHISHING☆35Updated 3 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆133Updated last month
- ☆19Updated last year
- An Assembly language course written in Arabic to teach technicians and Cybersecurity specialists the basics of Assembly language in x86 a…☆58Updated 2 years ago
- Just a part of my private notes☆85Updated last year
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆44Updated last year
- ☆11Updated 4 years ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆48Updated 8 months ago
- Bug Bounty Roadmap☆34Updated last year
- SQL Injection Vulnerability Scanner made with Python☆368Updated 3 months ago
- ☆13Updated 3 months ago