Requirements
Basic IT Skills
No prior knowledge required in bug hunting, hacking or programming.
Computer with a minimum of 4GB ram/memory.
Operating System: Windows / Apple Mac OS / Linux.
Description
Welcome to my comprehensive course on Bug Bounty Hunting & Web Security Testing course. This...
Enjoy! :)
Run this on a Sandboxie or an RDP, as some might contain malicious software. I found these on forums and websites, so I am not responsible for anything that happens, if you decide to run them on your own pc.
Hidden content
SudoDragon
Thread
cybersecurity
ethical hacking
hacking tools
web hacking
websecurity
Hidden content
Webhacking refers to the practice of exploiting vulnerabilities in websites to gain unauthorized access, manipulate data, or disrupt services. Common techniques used in webhacking include SQL injection, cross-site scripting (XSS), and remote code execution.. Understanding...
In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to exploit XSS in meta tags and hidden inputs.
YOU MUST
Hidden content
SudoDragon
Thread
exploit techniques
hidden inputs
meta tags
websecurity
xss vulnerabilities
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities.
Features
Technical Data about victim browser
Geolocation of the victim
Snapshot of the hooked/visited page
Source code of the hooked/visited page
Exfiltrate input field...
Burp Suite Professional is a comprehensive toolkit used for web application security testing. Its capabilities include:
Proxy Interception: Allows you to intercept and modify requests between the browser and web servers for manual testing.
Spidering: Automatically crawls web applications to...
SUB-ZER0
Thread
burp suite
cybersecurity
penetration testing
vulnerability assessment
websecurity
Nikto
A free and open source web server scanner.
Links and other resources:
Hidden content
Copy paste description:
Nikto 2.5 is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 7,000 potentially dangerous...
SUB-ZER0
Thread
cybersecurity tools
nikto
server scanner
vulnerability assessment
websecurity
Hello,
I bring you an application for those hackers who are learning the "basics" of hacking. It is a vulnerable web application and your job will be to exploit all these vulnerabilities. There are three levels of difficulty available: easy, intermediate or difficult level. It is a simple way...