Zorono / Learning-PDFs
☆107Updated 2 months ago
Alternatives and similar repositories for Learning-PDFs:
Users that are interested in Learning-PDFs are comparing it to the libraries listed below
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆85Updated 10 months ago
- ☆194Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆286Updated this week
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆145Updated 9 months ago
- Shodan Dorks 2023☆233Updated 2 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated last month
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆466Updated 2 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆36Updated 3 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆35Updated 3 weeks ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆92Updated last month
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆125Updated 3 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆167Updated 2 months ago
- Web Penetration Testing Course Materials☆32Updated 10 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆132Updated 4 months ago
- cyber security mind maps collection☆205Updated last year
- OSCP Cheatsheet by Sai Sathvik☆68Updated last year
- Application Fuzzing: Tools, Techniques, and Best Practices☆160Updated 5 months ago
- A Powerful Recon Engine☆60Updated 3 months ago
- A collection of config files for linux focusing on hackthebox theme☆41Updated 2 months ago
- Automation tool to testing and confirm the xss vulnerability.☆219Updated last month
- ☆426Updated last week
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆238Updated 2 months ago
- Tool for hiding Kali Linux on the network☆307Updated 9 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆118Updated this week
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆292Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆105Updated 2 months ago
- A monster cheatsheet on MITM attacks☆335Updated last year
- ☆37Updated 7 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆124Updated 2 months ago