Lists (2)
Sort Name ascending (A-Z)
Stars
Collection of methodology and test case for various web vulnerabilities.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
A list of resources for those interested in getting started in bug bounties
A list of resources for those interested in getting started in bug bounties inspired from https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)
A curated list of various bug bounty tools
A list of interesting payloads, tips and tricks for bug bounty hunters.
Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Source code for Hacker101.com - a free online web and mobile security class.
These are my checklists which I use during my hunting.
Cheatsheet to exploit and learn SQL Injection.
A cheat sheet that contains advanced queries for SQL Injection of all types.
Follow this repo if you are taking CEH(Practical) Exam By Ec-Council
CEH Practical Exam Notes (ilab), Blog and video
This repository contains a collection of important notes and commands for the Certified Ethical Hacker (CEH) practical exam. Aspiring CEH professionals will find these resources invaluable in their…
My Personal Notes that I used on the Exam as a Cheatsheet
Minimalist notes for CEH-practical Cert.
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.