Zorono / Learning-PDFsLinks
☆119Updated 8 months ago
Alternatives and similar repositories for Learning-PDFs
Users that are interested in Learning-PDFs are comparing it to the libraries listed below
Sorting:
- ☆122Updated 2 months ago
- cyber security mind maps collection☆221Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 8 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆136Updated 4 months ago
- ☆202Updated 6 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated last month
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated last month
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆167Updated 3 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 7 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 10 months ago
- A collection of config files for linux focusing on hackthebox theme☆50Updated 8 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆195Updated 2 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆19Updated 2 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆209Updated last week
- Analyze Android native `.so` files☆77Updated 3 weeks ago
- Shodan Dorks 2023☆239Updated 7 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated last week
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated this week
- 100-Days-of-Hacking☆132Updated 2 years ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 7 months ago
- OSCP Cheatsheet by Sai Sathvik☆71Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆258Updated last month
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆149Updated 3 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆97Updated last year
- ☆141Updated 5 months ago
- ☆27Updated last year
- Hi everyone,☆59Updated 2 years ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated last month