nabasteh / Intro-To-Bug-Hunting
I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I would be happy if you introduce new resources to be added
☆32Updated last year
Alternatives and similar repositories for Intro-To-Bug-Hunting:
Users that are interested in Intro-To-Bug-Hunting are comparing it to the libraries listed below
- A list of awesome penetration testing tools and resources.☆80Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated 10 months ago
- List of some cybersecurity conferences☆57Updated last month
- A simple pentest container equipped with common python pentest tools.☆41Updated last month
- A tech enumeration toolkit focused on 404 Not found pages.☆24Updated 5 months ago
- Enumeration & fingerprint tool☆24Updated last year
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆27Updated 9 months ago
- A repository with informtion related to Cloud Osint☆88Updated 2 months ago
- ThreatTracer - A python Script to identify CVE by name & version by @FR13ND0x7F☆110Updated 6 months ago
- Here are some cool and some unpublished Dorks☆70Updated 2 months ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆37Updated last year
- ☆14Updated last year
- Challenge Python☆19Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆56Updated last year
- ☆16Updated last year
- vhost scanning☆34Updated last year
- aws cli pentesting/red team snippets☆32Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆29Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 5 years ago
- ☆19Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆71Updated 2 years ago
- Hi everyone,☆59Updated last year
- Filter URLs to save your time.☆59Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Simple bash Oneliners to make life easier☆62Updated 4 years ago
- ☆19Updated 2 years ago