bhaveshharmalkar / learn365
This repository contains all of the resources and materials of @bhavesharmalkar's Learn365 series, including links to articles, videos, and other learning resources.
☆25Updated last year
Alternatives and similar repositories for learn365:
Users that are interested in learn365 are comparing it to the libraries listed below
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆65Updated last year
- ☆100Updated last year
- My Notes & Resources Of Bug Bounty Checklists☆64Updated 3 months ago
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆49Updated 4 years ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 2 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆65Updated 3 years ago
- Cyber Security Notes, Methodology, Resources and Tips☆143Updated 2 weeks ago
- Write-ups of my findings.☆120Updated last year
- ☆40Updated last year
- This repository stores various roadmap(Mindmaps) for bug bounty Hunter, pentester, offensive(red team), defensive(blue team) and security…☆50Updated 2 years ago
- Private Nuclei Templates☆97Updated last month
- ☆65Updated 6 months ago
- Here Are Some Bug Bounty Resource From Twitter☆89Updated 2 months ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆96Updated 3 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 5 months ago
- Tips For Bug Bounty Hunters☆84Updated 2 years ago
- ☆97Updated 2 years ago
- 10,000 H1 Disclosed Reports☆107Updated 10 months ago
- HackLiners: CyberSec/BugHunting OneLiners☆55Updated 5 months ago
- Power of .bashrc and .bash_aliases☆30Updated 2 years ago
- ☆68Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆28Updated last year
- Bug-Bounty Resources and Articles☆69Updated 6 years ago
- get all nuclei temp from emad shanab repo in one run☆33Updated last year
- A collection oneliner scripts for bug bounty☆174Updated last year
- ☆80Updated last year
- 100-Days-of-Hacking☆129Updated last year
- Cloud, WEB, API☆133Updated last month
- Hi everyone,☆59Updated last year