Zorono / Learning-PDFsLinks
☆119Updated 7 months ago
Alternatives and similar repositories for Learning-PDFs
Users that are interested in Learning-PDFs are comparing it to the libraries listed below
Sorting:
- cyber security mind maps collection☆219Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆134Updated 4 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆203Updated last week
- ☆117Updated last month
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 7 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated 3 weeks ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated last week
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆386Updated 2 weeks ago
- Analyze Android native `.so` files☆40Updated last week
- ☆202Updated 6 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆52Updated 7 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated last week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆164Updated 2 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆97Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆257Updated last month
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 7 months ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆135Updated 2 months ago
- Shodan Dorks 2023☆238Updated 6 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆43Updated 2 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated 3 months ago
- OSCP Cheatsheet by Sai Sathvik☆70Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 8 months ago
- 100 Hacking Tools and Resources☆109Updated 2 years ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆192Updated 2 months ago
- A collection of config files for linux focusing on hackthebox theme☆49Updated 7 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆219Updated 7 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆306Updated 2 weeks ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆97Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago