gotr00t0day / Pentesting-RoadmapLinks
Penetration Testing Learning Guide
☆79Updated 5 months ago
Alternatives and similar repositories for Pentesting-Roadmap
Users that are interested in Pentesting-Roadmap are comparing it to the libraries listed below
Sorting:
- A quick bug bounty guide for beginners☆86Updated 6 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆78Updated 8 months ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆60Updated 5 months ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆90Updated 9 months ago
- Complete Roadmap for Penetration Testing☆250Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆386Updated last year
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 7 months ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆617Updated last year
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆309Updated last month
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆55Updated 7 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆32Updated 7 months ago
- An insane list of all dorks taken from everywhere from various different sources.☆721Updated last year
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆249Updated 6 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆396Updated last week
- ☆137Updated 5 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆565Updated 3 weeks ago
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, cr…☆25Updated 8 months ago
- All Solutions☆173Updated last year
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆80Updated 2 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- ☆24Updated 2 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆256Updated 11 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆91Updated 8 months ago
- Here Are Some Popular Hacking PDF☆533Updated last month
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆203Updated 7 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 7 months ago
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆51Updated 4 months ago
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- ☆506Updated last month
- Your Guide to browse Onine sites☆153Updated last year