nabasteh / Intro-To-Bug-HuntingLinks
I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I would be happy if you introduce new resources to be added
☆33Updated 2 years ago
Alternatives and similar repositories for Intro-To-Bug-Hunting
Users that are interested in Intro-To-Bug-Hunting are comparing it to the libraries listed below
Sorting:
- A simple pentest container equipped with common python pentest tools.☆42Updated last month
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last week
- Handy scripts and one-liners to make life easier☆36Updated 2 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆40Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 4 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- ☆35Updated 8 months ago
- vhost scanning☆36Updated 2 years ago
- aws cli pentesting/red team snippets☆32Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆20Updated 5 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Updated last year
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11Updated 2 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- ☆19Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆24Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Updated 2 weeks ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆16Updated 11 months ago
- ☆24Updated 10 months ago
- ☆19Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year