bittentech / Infosec-PPTs
☆19Updated 2 years ago
Alternatives and similar repositories for Infosec-PPTs:
Users that are interested in Infosec-PPTs are comparing it to the libraries listed below
- I collected it to help the bug hunter get a reward☆57Updated 2 years ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 2 months ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- ☆39Updated 3 years ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- ☆22Updated 3 years ago
- Tools and methods that I personally use for Recon and Exploitations☆34Updated this week
- ☆20Updated 2 years ago
- ☆37Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 6 months ago
- HackLiners: CyberSec/BugHunting OneLiners☆55Updated 4 months ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Updated last year
- Hi everyone,☆59Updated last year
- OSCP☆36Updated 3 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- My nots from Web application Hacker's Handbook☆18Updated 3 years ago
- ☆17Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆12Updated 3 years ago
- ☆76Updated 3 years ago
- This small script can download or update all the GitHub repo of your choice.☆21Updated 10 months ago
- This repository is about Learn | Hack | Share | Repeat.☆11Updated 2 years ago
- ☆27Updated 5 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated last year
- A solid recon tool I use personally.☆30Updated last year
- ☆31Updated 3 years ago
- Check if domain has bug bounty program or not☆27Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 2 months ago