Tuanp703 / Presentations-and-PapersLinks
Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics
☆8Updated 2 years ago
Alternatives and similar repositories for Presentations-and-Papers
Users that are interested in Presentations-and-Papers are comparing it to the libraries listed below
Sorting:
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 10 months ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- ☆29Updated 3 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- My nots from Web application Hacker's Handbook☆18Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 3 years ago
- ☆22Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021☆11Updated 3 years ago
- ☆11Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Sniper. Passive Secrets Hunting.🚬☆12Updated 3 years ago
- Open Redirect Vulnerability Payload List☆12Updated 4 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆13Updated 3 years ago
- ☆20Updated 2 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆16Updated 4 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆12Updated last year
- Automate bug bounty recon using bash alias☆14Updated 10 months ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 2 years ago