Table of contents
Overview
- π½ Let's Start
- π£ OSINT
- π¦ Google Hacking using Dorks
- βΉ Recon Tips
- πΈ Web Application
- Web Application Testing Checklist
- PORT SCANNING
- Subdomain Takeover Resources
- Technology Identification
- Content Discovery Tools
- Link Extraction Tools
- Parameter and Web Fuzzing Tools
- Screenshots
- File Inclusion,CSRF Injection,Directory Traversal
- GraphQL Injection,Insecure Deserialization,Header Injection
- Exploitation Tools Categorized by Vulnerability Type
- Insecure Direct Object References, Open Redirect, Request Smuggling
- Introducing 20 web-application hacking toolsπ₯π€©π΅
- Disclosed Reports π
- π€― SSRF From Hackerone
- Web Hack Tools
π¦ Twitter
β Tools
- Axion-Scan
- π Nmap's NSE Scripts for Ethical Password Testing
- Shodan Pentesting Guide
- π¬πΉ Hacking Templates