Zorono / Learning-PDFs
☆107Updated 3 months ago
Alternatives and similar repositories for Learning-PDFs:
Users that are interested in Learning-PDFs are comparing it to the libraries listed below
- cyber security mind maps collection☆208Updated last year
- ☆196Updated last month
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆35Updated last month
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆110Updated 5 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆204Updated last week
- Search for all leaked keys/secrets using one regex! bugbounty☆72Updated this week
- This script Crawl the website and find the urls that contains html forms.☆71Updated 9 months ago
- OSCP Cheatsheet by Sai Sathvik☆68Updated last year
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆92Updated 2 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆79Updated 3 weeks ago
- ☆114Updated 3 weeks ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆87Updated 11 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆474Updated 3 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆243Updated 2 months ago
- 100-Days-of-Hacking☆129Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆89Updated 2 weeks ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 3 months ago
- ☆118Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆136Updated 5 months ago
- ☆56Updated 7 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆292Updated last week
- ☆158Updated 5 months ago
- A Powerful Recon Engine☆62Updated 4 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆171Updated 3 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆297Updated last year
- Nuclei-AI-Prompts☆179Updated last month
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆189Updated 4 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆126Updated 2 months ago