imran-parray / Mind-Maps
Mind-Maps of Several Things
☆2,540Updated last year
Alternatives and similar repositories for Mind-Maps:
Users that are interested in Mind-Maps are comparing it to the libraries listed below
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,325Updated 5 months ago
- Ressources for bug bounty hunting☆1,814Updated 2 years ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,647Updated 2 years ago
- ☆1,554Updated last year
- ☆1,680Updated this week
- OSWE, OSEP, OSED, OSEE☆3,087Updated last week
- A collection of snippets of codes and commands to make your life easier!☆2,715Updated last year
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,588Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,823Updated 8 months ago
- Bug Bounty Roadmaps☆1,668Updated 3 years ago
- ☆1,077Updated 2 weeks ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,080Updated last year
- Rockyou for web fuzzing☆2,779Updated 2 months ago
- Work in progress...☆704Updated 2 months ago
- ☆1,501Updated 2 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,467Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,183Updated 2 years ago
- A repository that includes all the important wordlists used while bug hunting.☆1,288Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,449Updated 8 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,094Updated 3 weeks ago
- Red Teaming & Pentesting checklists for various engagements☆2,531Updated 8 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,608Updated 2 years ago
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,590Updated 2 years ago
- A OWASP Based Checklist With 500+ Test Cases☆730Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,783Updated 11 months ago
- Top disclosed reports from HackerOne☆4,486Updated last week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,115Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,155Updated 2 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,754Updated 10 months ago
- A curated list of awesome OSCP resources☆2,865Updated 11 months ago