Table of contents
- π Cipherops
- π€© Embarking on Your Hacking Journey: A Guide for Beginners
- π Journeying Through the World of Ethical Hacking with Cipher-ops
- Let's Start
Overview
- Subdomain Takeover Resources
- Damn Vulnerabilities List Lab
- PORT SCANNING
- Offensive virtual machine's
- Essential Linux Commands
- 30 cybersecurity search engines
- cybersecurity YouTube channels
- Try-Hack-me Roadmap
- OSINT
- Screenshots
- Technology Identification
- Content Discovery Tools
- Link Extraction Tools
- Parameter and web fuzzing tools
π₯² Exploitation
- Exploitation Tools Categorized by Vulnerability Type
- File Inclusion,CSRF Injection,Directory Traversal
- GraphQL Injection,Insecure Deserialization,Header Injection
- Insecure Direct Object References, Open Redirect, Request Smuggling