☆26Feb 28, 2023Updated 3 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- someone needs help☆66Jul 25, 2022Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆54Jul 12, 2022Updated 3 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- Nginx alias traversal vulnerable environments for study☆15May 8, 2020Updated 5 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- ☆15Dec 1, 2021Updated 4 years ago
- Icahn Graduate School of Medicine: Systems Biology & Biotechnology Specialization☆14Jun 17, 2017Updated 8 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated last month
- ☆12Dec 26, 2021Updated 4 years ago
- ☆10Feb 21, 2022Updated 4 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Security pentesting/devsecops/bug bounty/Cloud etc.☆20Feb 7, 2024Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- ☆22Jul 16, 2021Updated 4 years ago
- ☆81May 27, 2023Updated 2 years ago
- A small script for my recon during bug hunting. Needs some modifications☆17Mar 5, 2020Updated 6 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆91Jan 14, 2022Updated 4 years ago
- ☆22Oct 30, 2022Updated 3 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆96Jun 5, 2021Updated 4 years ago
- XSS reflector vulnerabilities exploitation extended.☆27Jul 25, 2021Updated 4 years ago
- Most of the Google Acquisitions for Bug Bounty Hunter.☆64Sep 3, 2022Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- BSCIT Network Security Notes☆11Oct 1, 2018Updated 7 years ago
- security.txt collection of most popular world-wide domains☆56Sep 25, 2023Updated 2 years ago
- This repository is about @AnubhavSingh_'s 365 days of Learning Tweets collection.☆229Dec 31, 2022Updated 3 years ago
- Scan all possible TLD's for a given domain name☆83Jun 17, 2021Updated 4 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 4 months ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆542Aug 4, 2022Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Mar 19, 2025Updated last year
- ASN reconnaissance script☆28Jun 14, 2020Updated 5 years ago