V35HR4J / 30-Days-of-PHP-source-code-analysis
30 Days of PHP source code analysis
☆14Updated 2 years ago
Alternatives and similar repositories for 30-Days-of-PHP-source-code-analysis:
Users that are interested in 30-Days-of-PHP-source-code-analysis are comparing it to the libraries listed below
- ☆15Updated 3 years ago
- FbUID is a tool written in bash to help people extract userID from public Facebook Profiles when username is known.☆17Updated 3 years ago
- Enumerate most common password patterns with custom keyword.☆10Updated 2 years ago
- hacking-resources☆1Updated 3 years ago
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆20Updated 3 years ago
- A collection of notes for bug bounty hunting☆237Updated last year
- Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on…☆11Updated last year
- Resources that help you learn the fundamentals of ethical hacking.☆47Updated 2 years ago
- This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place☆249Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆90Updated 3 years ago
- A premier resource for pentesting professionals and enthusiasts. Explore top-tier tutorials, tools, and guides designed to sharpen your s…☆9Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆16Updated 4 years ago
- Real-time XSS Detection Suite!☆33Updated 3 years ago
- Bug Bounty - Important Books☆21Updated 4 years ago
- Script to automate bypassing 403 forbidden status code☆11Updated 2 months ago
- Fast web fuzzer written in Go☆49Updated 2 years ago
- BugBounty_CheatSheet☆250Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆73Updated last month
- ☆28Updated 2 years ago
- ☆178Updated 7 months ago
- Just a part of my private notes☆80Updated last year
- Simple recon using multiple tools!☆164Updated 3 years ago
- ☆182Updated last year
- List of every possible vulnerabilities in computer security.☆65Updated 2 years ago
- A Collection of Notes, Methodologies, POCs and everything else related to Bug Hunting.☆152Updated 3 years ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆128Updated 7 months ago
- recon from myerspective☆47Updated 2 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆97Updated 2 months ago
- All the labs in this repository simulate real world bugs I found in the wild☆176Updated 8 months ago
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆413Updated 2 years ago