SureshKumarPakalapati / cybersecurity
☆14Updated 3 years ago
Alternatives and similar repositories for cybersecurity:
Users that are interested in cybersecurity are comparing it to the libraries listed below
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated 3 weeks ago
- ☆51Updated last year
- Python for AWAE (Advanced Web Attacks and Exploitation)☆93Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆80Updated last week
- Complete Roadmap for Penetration Testing☆205Updated 6 months ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆98Updated last year
- A Powerful Recon Engine☆61Updated 4 months ago
- Web Application Penetration Testing☆107Updated last month
- My Private Bug Hunting Methodology☆283Updated 4 months ago
- Dorks for Bug Bounty Hunting☆173Updated 8 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆46Updated last year
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulne…☆109Updated last week
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆45Updated 3 years ago
- This repository stores various roadmap(Mindmaps) for bug bounty Hunter, pentester, offensive(red team), defensive(blue team) and security…☆50Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 2 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆96Updated 3 years ago
- ☆94Updated last month
- ☆20Updated 4 months ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆72Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆99Updated 2 months ago
- Automate Recon XSS Bug Bounty☆153Updated last week
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆204Updated last week
- ☆16Updated 7 months ago
- ☆101Updated 2 years ago
- Hi everyone,☆59Updated last year
- ☆114Updated 2 weeks ago
- My OSWE Pre-preperation (i.e. before acutally buying the course) phase plan and notes!☆74Updated 2 years ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆65Updated last year
- A collection of notes for bug bounty hunting☆238Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆70Updated last year