sudobyter-hub / Pentesting0x
A premier resource for pentesting professionals and enthusiasts. Explore top-tier tutorials, tools, and guides designed to sharpen your skills and advance your cybersecurity knowledge.
☆9Updated last year
Alternatives and similar repositories for Pentesting0x
Users that are interested in Pentesting0x are comparing it to the libraries listed below
Sorting:
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆74Updated 3 months ago
- ☆27Updated 2 years ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated last year
- ☆48Updated 8 months ago
- ☆14Updated 2 months ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆120Updated last year
- ☆19Updated last year
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆11Updated 5 months ago
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆57Updated last year
- A collection of notes for bug bounty hunting☆240Updated last year
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆80Updated last year
- ☆197Updated last year
- ☆24Updated 2 years ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆58Updated 6 months ago
- A resources for who want to learn and get deep into client-side bugs☆46Updated 5 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆118Updated 4 months ago
- www.sec-down.com☆18Updated 4 years ago
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆17Updated last month
- ♥☆116Updated 7 months ago
- My Private Bug Hunting Methodology☆294Updated 5 months ago
- The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API S…☆31Updated 2 months ago
- ☆147Updated 4 months ago
- ☆14Updated last month
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆39Updated 6 months ago
- ☆52Updated 11 months ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆43Updated 7 months ago
- ☆17Updated last year
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆19Updated 5 months ago
- Bug Bounty Platforms☆25Updated 6 months ago
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆49Updated 3 weeks ago