vulnerability assessment

  1. SudoDragon

    VIKAS CHAUDHARY BUG BOUNTY HUNTING - OFFENSIVE APPROACH TO HUNT BUGS 2021!!!

    ========== Hello,There!:) ============================= This are The Contents in The Course!: ==================================== ?Information Gathering & Basic Terminologies ?Introduction of Burpsuite ?Comprehensive XSS ?Host Header Injection ?URL Redirection ?Parameter Tampering ?HTML...
  2. SudoDragon

    BUG BOUNTY POC FULL COURSE

    Hidden content
  3. SUB-ZER0

    BURPSUITE PROFESSIONAL V2025.7.2

    Burpsuite the latest professional version, you need jdk 11 minimum. Works on Linux, Mac, and Windows. Hidden content Virustotal link VirusTotal
  4. SUB-ZER0

    BURPSUITE PROFESSIONAL V2025.9.4 + BURPBOUNTYPRO V2.8.0

    Burp Suite Professional is a comprehensive toolkit used for web application security testing. Its capabilities include: Proxy Interception: Allows you to intercept and modify requests between the browser and web servers for manual testing. Spidering: Automatically crawls web applications to...
  5. SUB-ZER0

    NIKTO - A FREE WEB SERVER SCANNER.

    Nikto A free and open source web server scanner. Links and other resources: Hidden content Copy paste description: Nikto 2.5 is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 7,000 potentially dangerous...
  6. SudoDragon

    EASY METHOD: TEST VULNERABLE PARAMETER!

    ----------------------------------------------------------------------------------------------------------------------------------- Hidden content -----------------------------------------------------------------------------------------------------------------------------------
  7. Buster

    PENETRATION TEST & VULNERABILITY ASSESSMENT [web & all social apps HACKING] @Bust44r

    Hidden content
  8. Nightmare

    The World of Hacking 🌐💻🔒

    1/ Hacking is a term that often conjures images of cybercrime, but it's essential to distinguish between malicious activities and ethical hacking. Ethical hackers use their skills to identify and fix vulnerabilities, making the digital world more secure. Let's explore the different facets of...
  9. Nightmare

    Graphic Design Masterclass - Learn GREAT Design

    https://mega.nz/folder/7T4zDZja#teGNSTOjImSjs97TCTb_wQ 5.61 GB folder on MEGA
  10. Nightmare

    Complete Course Of Kali Linux In Hindi

    Complete Course Of Kali Linux In Hindi Hidden content
  11. Nightmare

    SITES TO SEARCH FOR PUBLIC EXPLOITS

    open exploits can be found on these sites ... https://vulners.com/ https://0day.today/ https://exploit.kitploit.com/ OffSec’s Exploit Database Archive OffSec’s Exploit Database Archive https://packetstormsecurity.com/ https://vuldb.com https://www.rapid7.com/db/
  12. Nightmare

    WEB HACKING 101 BOOK

    PETER YAWORSKI'S WEB HACKING 101 BOOK Hidden content
  13. Nightmare

    Comic book fanbase ⭐ book fanbase

    https://readcomiconline.li/
  14. Nightmare

    Metasploit Penetration Testing Recipes

    https://mega.nz/folder/xA4ARa6J#l07RRfWdYlfQEXxB1V-e6g
Top