sanchayofficial / meetups-ppt
You'll find all the resources and presentations I have used in my talks and workshops
☆12Updated 5 months ago
Alternatives and similar repositories for meetups-ppt
Users that are interested in meetups-ppt are comparing it to the libraries listed below
Sorting:
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆28Updated 3 weeks ago
- Complete Roadmap for Penetration Testing☆214Updated 7 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆121Updated 4 months ago
- ☆21Updated 2 weeks ago
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆29Updated this week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆108Updated last month
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆22Updated last year
- 100 Hacking Tools and Resources☆104Updated last year
- 100 days of cybersecurity - join Discord and connect with us to know more on this challenge #100daysofcybersecurity #sector21☆173Updated last month
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 4 months ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆51Updated last year
- custom-echo for koth tryhackme, holmes is such a homie <3☆17Updated 2 years ago
- Scripts for offensive security☆115Updated 2 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆298Updated last week
- capNcook - a dark web exploration tool☆100Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆105Updated last month
- ☆23Updated 7 months ago
- INE Training Notes☆28Updated last month
- Start Bug Bounty Hunting & earn some $$$$☆35Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆72Updated last year
- ☆48Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆96Updated last month
- 100-Days-of-Hacking☆129Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆98Updated 2 months ago
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 8 months ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆81Updated 2 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 5 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆181Updated 4 months ago
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified P…☆272Updated 3 weeks ago
- Exploiting the xmlrpc.php☆46Updated last year