Zorono / Learning-PDFsLinks
☆124Updated last year
Alternatives and similar repositories for Learning-PDFs
Users that are interested in Learning-PDFs are comparing it to the libraries listed below
Sorting:
- cyber security mind maps collection☆225Updated 2 years ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆230Updated this week
- ☆142Updated 7 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆86Updated this week
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆122Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated 3 weeks ago
- Search for all leaked keys/secrets using one regex! bugbounty☆182Updated 9 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆215Updated 4 months ago
- ☆205Updated 11 months ago
- Shodan Dorks 2023☆243Updated last year
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆218Updated 10 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Updated last year
- OSCP Cheatsheet by Sai Sathvik☆85Updated 2 years ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Updated 6 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆104Updated 6 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆163Updated 8 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆47Updated 7 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆151Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Updated last year
- ☆184Updated last year
- ☆168Updated last month
- Analyze Android native `.so` files☆118Updated 5 months ago
- Docker Remote API Scanner and Exploit☆180Updated 2 years ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆100Updated 2 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Updated last year
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆313Updated this week
- How to Crack an Entry Level Job in Cybersecurity! - 2024☆21Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆197Updated 5 months ago