Zorono / Learning-PDFs
☆115Updated 4 months ago
Alternatives and similar repositories for Learning-PDFs
Users that are interested in Learning-PDFs are comparing it to the libraries listed below
Sorting:
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆301Updated last week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆108Updated last month
- cyber security mind maps collection☆213Updated last year
- ☆199Updated 3 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆38Updated last week
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆91Updated last week
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 5 months ago
- 100-Days-of-Hacking☆129Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆250Updated last week
- ☆129Updated 2 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated 3 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆94Updated last year
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆482Updated last month
- Search for all leaked keys/secrets using one regex! bugbounty☆126Updated last month
- OSCP Cheatsheet by Sai Sathvik☆69Updated last year
- Nuclei-AI-Prompts☆190Updated last month
- This script Crawl the website and find the urls that contains html forms.☆70Updated 11 months ago
- A Powerful Recon Engine☆63Updated 5 months ago
- Shodan Dorks 2023☆232Updated 4 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆181Updated 4 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- ☆119Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆91Updated last year
- Web Penetration Testing Course Materials☆32Updated last year
- A passive way to find backups/ sensitive information.☆78Updated 2 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆112Updated 6 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆140Updated 6 months ago
- ☆162Updated 6 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆135Updated last month
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆147Updated 11 months ago