gotr00t0day / Pentesting-RoadmapLinks
Penetration Testing Learning Guide
โ71Updated 4 months ago
Alternatives and similar repositories for Pentesting-Roadmap
Users that are interested in Pentesting-Roadmap are comparing it to the libraries listed below
Sorting:
- A quick bug bounty guide for beginnersโ85Updated 5 months ago
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ90Updated 7 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability dโฆโ76Updated 6 months ago
- Complete Roadmap for Penetration Testingโ245Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.โ230Updated 4 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.โ373Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Prosโ350Updated last month
- An insane list of all dorks taken from everywhere from various different sources.โ711Updated 11 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windowsโฆโ202Updated 6 months ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nucleiโฆโ57Updated 4 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working oโฆโ77Updated 2 years ago
- โ130Updated 4 months ago
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, crโฆโ25Updated 7 months ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheetโ594Updated last year
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their sโฆโ51Updated 6 months ago
- โ469Updated last week
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.โ548Updated 3 weeks ago
- ๐ฅท SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, etโฆโ306Updated this week
- Bug Bounty Tools used on Twitch - Reconโ314Updated last year
- recon for bug huntersโ806Updated 3 weeks ago
- All Solutionsโ168Updated last year
- High quality and text versions of cheat sheets from Cyber Detective Twitterโ34Updated last year
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.โ64Updated 3 years ago
- โ78Updated last month
- A Modern Framework for Bug Bounty Huntingโ629Updated 8 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ241Updated 9 months ago
- Auto Recon tool for finding SQLi,XSS,LFi,OpenRedirectโ49Updated 7 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs โฆโ254Updated 6 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.โ31Updated 6 months ago
- Here Are Some Popular Hacking PDFโ521Updated last month