Munazirul Islam's Projects
100 Days of hacking consistently. https://notes.munazir.com https://munazir.com/blog/100daysofhacking
All about bug bounty (bypasses, payloads, and etc)
Termux tools
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
A curated list of amazingly awesome Burp Extensions
š¶ A curated list of Web Security materials and resources.
Awesome XSS stuff
Trilok BB methodology
A list of interesting payloads, tips and tricks for bug bounty hunters.
Study notes for the Certified Ethical Hacker v12.
Certification Cheatsheets
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
CVE-2022-0847 Python exploit to get root or write a no write permission, immutable or read-only mounted file.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.
eLearnSecurity Junior Penetration Tester Certificate (eJPT) PTS Notes
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Practical Ethical Hacking Labs š”š”
Tips and Tutorials for Bug Bounty and also Penetration Tests.
game of active directory
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Hacker-Blog is a minimalistic, responsive jekyll theme built for hackers. https://ashishchaudhary.in/hacker-blog
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.