x3rz / Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
☆16Updated 5 years ago
Alternatives and similar repositories for Resources-for-Beginner-Bug-Bounty-Hunters:
Users that are interested in Resources-for-Beginner-Bug-Bounty-Hunters are comparing it to the libraries listed below
- ☆25Updated 2 years ago
- # Instagram-Login-Page-Clone☆12Updated 9 months ago
- Notes for Beginner Network Pentesting Course☆5,918Updated 2 years ago
- ☆1,870Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,033Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆1,652Updated last year
- ☆11Updated 4 months ago
- A VERY DANGEROUS PHISHING TOOL FOR LINUX USER☆14Updated 4 years ago
- ☆32Updated 2 months ago
- The Multi-Tool Web Vulnerability Scanner.☆1,830Updated last year
- This is Advance Phishing Tool ! OTP PHISHING☆2,859Updated 8 months ago
- Collection of methodology and test case for various web vulnerabilities.☆6,325Updated 2 weeks ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11,659Updated 5 months ago
- ☆2,385Updated 7 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆5,616Updated 2 years ago
- A tool for parsing breached passwords☆1,948Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,249Updated 6 months ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆2,667Updated 8 months ago
- This is a repository for all the writeups of CTFs organized by us.☆18Updated 3 weeks ago
- 🎯 Command Injection Payload List☆3,214Updated 8 months ago
- course materials for class IT19.1☆6Updated 4 years ago
- Accurately Locate Smartphones using Social Engineering☆7,711Updated 11 months ago
- ☆1,266Updated last year
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,344Updated 11 months ago
- ☆2,090Updated 5 months ago
- Advanced Phishing tool☆3,444Updated 2 years ago
- Sample pentest report provided by TCM Security☆1,162Updated 3 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,971Updated 2 months ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,436Updated 6 months ago
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆3,828Updated 5 months ago