Roadmap to get started in Infosec for absolute begineer
☆110May 23, 2024Updated last year
Alternatives and similar repositories for hacker-roadmap
Users that are interested in hacker-roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆69Feb 28, 2025Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- is a random text generator based on context-free grammars, it uses a EBNF for grammar definitions.☆18May 5, 2025Updated 10 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- ☆24Dec 31, 2025Updated 2 months ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆52Nov 3, 2025Updated 4 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- ☆128Jul 15, 2021Updated 4 years ago
- ☆25Dec 28, 2023Updated 2 years ago
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- A set of open-source community scripts☆64Oct 12, 2024Updated last year
- Client Side Prototype Pollution Scanner☆523Sep 17, 2022Updated 3 years ago
- Gum Program Library, a collection of on chain programs maintained by Magicblock☆12Nov 26, 2025Updated 3 months ago
- My cyber security notes.☆14Feb 22, 2025Updated last year
- ☆12Feb 17, 2023Updated 3 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- Find all libraries on cdn.js that pollute your prototype☆19Sep 1, 2022Updated 3 years ago
- ☆17Sep 14, 2021Updated 4 years ago
- Client-Side Prototype Pollution Tools☆87Sep 21, 2021Updated 4 years ago
- A collection of data structures and algorithms coded in Rust by 0xIchigo☆44Jul 4, 2023Updated 2 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆17Oct 9, 2024Updated last year
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- ☆28Jan 6, 2024Updated 2 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- ☆11Mar 27, 2024Updated last year
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆12Apr 25, 2024Updated last year
- a repository of all the CTF challenges I've made for public events☆63Jul 30, 2025Updated 7 months ago
- ☆47Sep 20, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆29May 22, 2024Updated last year