h0tak88r / Sec-88Links
Cyber Security Notes, Methodology, Resources and Tips
☆164Updated last month
Alternatives and similar repositories for Sec-88
Users that are interested in Sec-88 are comparing it to the libraries listed below
Sorting:
- ☆105Updated 2 years ago
- Never forget where you inject.☆257Updated 2 years ago
- Top disclosed reports from HackerOne☆155Updated 4 years ago
- A collection oneliner scripts for bug bounty☆179Updated last year
- ☆201Updated 5 months ago
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆322Updated last year
- My Private Bug Hunting Methodology☆305Updated 7 months ago
- My small collection of reports templates (This is a fork of orignal repo from https://github.com/gwen001/BB-datas)☆124Updated last year
- A tool to find good RCE☆170Updated 3 years ago
- 10,000 H1 Disclosed Reports☆112Updated last year
- Private Nuclei Templates☆100Updated 4 months ago
- Automatic Bug finder with buprsuite☆166Updated 2 years ago
- Quick research done on some bug bounty blogs! Check em out :)☆136Updated 5 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆165Updated 11 months ago
- My Priv8 Nuclei Templates☆321Updated last year
- ☆245Updated 4 years ago
- Nuclei-AI-Prompts☆212Updated 3 weeks ago
- ☆300Updated 2 years ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆277Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆282Updated last year
- Dorks for Bug Bounty Hunting☆176Updated last year
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆101Updated 3 years ago
- ☆172Updated 5 months ago
- Self-hosted passive subdomain continous monitoring tool.☆165Updated last year
- Web Application Penetration Testing☆120Updated 2 months ago
- Describe how to use ffuf different options with examples☆89Updated 2 years ago
- ☆135Updated 4 months ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆214Updated last year
- ☆73Updated 9 months ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆289Updated last year