Practical Bug Bounty Hunting for Hackers and Pentesters, by EC-Council
☆24Oct 6, 2021Updated 4 years ago
Alternatives and similar repositories for Practical-Bug-Bounty-Hunting-for-Hackers-and-Pentesters
Users that are interested in Practical-Bug-Bounty-Hunting-for-Hackers-and-Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 4 months ago
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- 网页版串口终端☆13Dec 9, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bug Bounty ultimate tool☆28Dec 3, 2025Updated 4 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆41Jan 13, 2026Updated 3 months ago
- UPS has developed Software Development Kits (SDKs) to be used as a low-code solution for customers wishing to integrate with UPS APIs. Th…☆37Jan 28, 2025Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 4 years ago
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 4 months ago
- SQL Injection – Attack and Defense Strategies, published by Packt☆16Jan 30, 2023Updated 3 years ago
- Agent responsible for network discovery and security auditing using Nmap.☆23Feb 26, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆15Oct 19, 2023Updated 2 years ago
- The Complete Mobile Ethical Hacking, by EC-Council☆39Dec 23, 2020Updated 5 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆20Sep 14, 2021Updated 4 years ago
- A vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to…☆14Dec 13, 2024Updated last year
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated 3 months ago
- ☆23May 24, 2024Updated last year
- Repository of CTF challenges for The Cyber Jawara International 2024☆19Oct 28, 2024Updated last year
- Excel and Power Query projects☆28Jul 5, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 6 months ago
- My CEH Practical Preparation☆24Mar 16, 2021Updated 5 years ago
- ☆18Apr 26, 2025Updated 11 months ago
- This contains scripts, tools, and other programs I show case on my youtube channel.☆20Oct 30, 2025Updated 5 months ago
- 🦾🤖 Mobilenet model implementation for image classification using the tflite library, a Flutter plugin for accessing TensorFlow Lite API…☆32May 1, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆21Oct 7, 2022Updated 3 years ago
- Info website for an NGO 'Ranjeet Bakhshi Jan Kalyan Sabha' which aims to empower local communities in Himachal Pradesh☆10Jun 14, 2024Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Aug 12, 2020Updated 5 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆18Aug 20, 2025Updated 7 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Search NVD locally☆14Jun 4, 2025Updated 10 months ago
- My Powershell notes☆16Sep 27, 2022Updated 3 years ago
- PowerShell module that intearacts with the VirusTotal service using a VirusTotal API (free)☆82Feb 14, 2026Updated 2 months ago
- IP maths commands in PowerShell☆43May 25, 2023Updated 2 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- XSS payloads to bypass various XSS filters☆14May 1, 2019Updated 6 years ago
- ☆39Jan 4, 2019Updated 7 years ago