nahamsec / nahamsec.trainingLinks
The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)
☆451Updated 2 years ago
Alternatives and similar repositories for nahamsec.training
Users that are interested in nahamsec.training are comparing it to the libraries listed below
Sorting:
- ☆524Updated 3 years ago
- ☆1,078Updated 2 months ago
- ☆351Updated 3 years ago
- BugBounty_CheatSheet☆252Updated 2 years ago
- ☆395Updated 2 years ago
- RepoToStoreBugBountyInfo☆324Updated 5 years ago
- This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place☆256Updated 3 years ago
- ☆184Updated 10 months ago
- These are my checklists which I use during my hunting.☆654Updated last year
- A collection of notes for bug bounty hunting☆246Updated last year
- checklist for testing the web applications☆262Updated 2 years ago
- this html file creates a csrf poc form to any http request.☆281Updated 2 years ago
- ☆438Updated 2 years ago
- PDF slides☆247Updated 3 years ago
- ☆426Updated 3 years ago
- A Modern Framework for Bug Bounty Hunting☆601Updated 4 months ago
- ☆235Updated 4 years ago
- Simple recon using multiple tools!☆165Updated 3 years ago
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆425Updated 2 years ago
- Web recon script. No need to fear, sumrecon is here!☆378Updated 2 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆538Updated 2 years ago
- ☆427Updated 2 years ago
- 🎯 RFI/LFI Payload List☆599Updated 11 months ago
- Vulnerable API☆408Updated 2 years ago
- Writeups for PortSwigger WebSecurity Academy☆316Updated 2 years ago
- A Collection of Notes, Methodologies, POCs and everything else related to Bug Hunting.☆157Updated 3 years ago
- Beginner Guide to Bug Hunting☆782Updated last year
- Bug Bounty Tools used on Twitch - Recon☆303Updated 9 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆144Updated 7 years ago
- ☆642Updated last week