This TryHackMe Rooms contains the series wise rooms from Beginner to Expert Level Rooms. If you are new to TryHackMe follow this pathway for great start.
☆107Feb 11, 2025Updated last year
Alternatives and similar repositories for TryHackMe_Zero_To_Hero_Path
Users that are interested in TryHackMe_Zero_To_Hero_Path are comparing it to the libraries listed below
Sorting:
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- ☆14Apr 9, 2019Updated 6 years ago
- Python Automation☆13May 19, 2021Updated 4 years ago
- Fetch & Filter Known URLs☆15Aug 3, 2022Updated 3 years ago
- SAP penetration testing Web and network cheatsheet☆17May 15, 2022Updated 3 years ago
- ☆14Feb 15, 2022Updated 4 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- ☆12Jun 15, 2022Updated 3 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Wordpress Plugin "WP Checkout" Mass exploit☆16Jun 18, 2017Updated 8 years ago
- ☆16Jun 7, 2020Updated 5 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- ☆38Dec 10, 2023Updated 2 years ago
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆46Apr 14, 2018Updated 7 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- a list of 390+ Free TryHackMe rooms to start learning cybersecurity with THM☆1,196Jan 25, 2026Updated last month
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- Uhuru OS - a Distro focused on enhancement several types of security☆42Jun 23, 2023Updated 2 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆54Oct 16, 2023Updated 2 years ago
- ☆21Jul 13, 2022Updated 3 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- AWS S3 open bucket poc automated script.☆56Aug 23, 2021Updated 4 years ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago