A collection of resources and reading material that we recommend
☆318Oct 12, 2024Updated last year
Alternatives and similar repositories for recommends
Users that are interested in recommends are comparing it to the libraries listed below
Sorting:
- Winning submission for the GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 25, 2020Updated 5 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆18Feb 16, 2021Updated 5 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- ☆40Jul 24, 2022Updated 3 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Nov 21, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆27Jul 30, 2021Updated 4 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆27Jun 18, 2024Updated last year
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 3 years ago