nabasteh / Intro-To-Bug-Hunting
I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I would be happy if you introduce new resources to be added
☆32Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Intro-To-Bug-Hunting
- A simple pentest container equipped with common python pentest tools.☆41Updated this week
- Workshop & Talk Slide Decks from HackSpaceCon☆24Updated 5 months ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆30Updated 7 months ago
- A tech enumeration toolkit focused on 404 Not found pages.☆24Updated last month
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Updated last year
- CompTIA Security+ SY0-601 notes (passed 788 points)☆31Updated last week
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- Tools used for Pentesting☆22Updated last year
- Challenge Python☆19Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆35Updated last month
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated last year
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆46Updated last month
- A list of awesome penetration testing tools and resources.☆77Updated last year
- A learning and testing environment for web application hacking and pentesting.☆24Updated 3 years ago
- Chrome extension tool for OSINT & Recon☆50Updated 8 months ago
- Recon scripts for Red Team and Web blackbox auditing☆29Updated this week
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆34Updated 8 months ago
- Repository of cybersecurity mindmaps☆30Updated last year
- List of some cybersecurity conferences☆55Updated 6 months ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆38Updated 4 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- This tool compares the WHOIS information of domains to identify similarities and determine if they likely belong to the same company☆13Updated 11 months ago
- aws cli pentesting/red team snippets☆32Updated 10 months ago
- Field guide to gather low-hanging fruits☆13Updated 9 months ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆21Updated 9 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆27Updated last year
- A summary of the most abbreviations I encountered so far☆17Updated this week
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆21Updated 5 months ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆36Updated last year