Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
@Hacking-Notes
Hacking-Notes
Follow
View Hacking-Notes's full-sized avatar
📖
ⓘ Hacking Activity Detected

Hacking Notes Hacking-Notes

📖
ⓘ Hacking Activity Detected
VHJ1ZSBwb3dlciBsaWVzIGluIHRoZSBhYmlsaXR5IHRvIHNlZSB3aGF0IG90aGVycyBjYW5ub3Q=

Block or report Hacking-Notes

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more aboutblocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more aboutreporting abuse.

Report abuse
Hacking-Notes/README.md

Welcome to my cyber sanctuary! I'm Alex, a passionate cyber security enthusiast, dedicated to expanding my knowledge and skills in the field. I'm fueled by a deep desire to learn and explore the intricacies of cyber security. I'm fervently committed to understanding the digital landscape and contributing positively to it. If you're interested in joining me on this journey of discovery and empowerment, let's dive into the world of cyber security together!



Bug Bounty Contributions 🐛

 Governments / Municipalities 
᲼᲼
 Domain Providers 
᲼᲼
 Hotel Chains 
᲼᲼
 ... 

📒 Discover more about my related work with myblog articles.


CVE Contributions

CVE-2024-51490
᲼᲼
CVE-2024-51486
᲼᲼
CVE-2024-51489
᲼᲼
CVE-2024-51380
᲼᲼
CVE-2024-51381
᲼᲼
...

Explore my collection of CVE's in myrepository.


Presentation 📚
  XSS Chain Reaction
᲼᲼  Congestion Pipe Attack


Main Resources

---> Hacking Notes (RedTeam & BlueTeam) <------> Roadmap to Hacking Mastery <---
Unlock a wealth of hacking wisdom in my GitHub repository. These notes, curated by seasoned experts, offer concise insights into the world of cybersecurity. Perfect for beginners and veterans alike, dive in and elevate your hacking prowess today. Discover the roadmap to hacking mastery. Whether you're a hobbyist, aspiring certifier, or degree seeker, our curated resources and structured paths will guide you. From networking basics to advanced penetration testing, cultivate the hacker mindset and become a cybersecurity expert. Your journey starts here.
Hacking-NotesHacking-Roadmap
---> Note Taking - BurpSuite Obsidian Integration <------> EndPointer (Collaborative Work) <---
Struggling with chaotic notes? Learn my effective note-taking system, including a specialized tool and structured methodology, designed to enhance productivity and collaboration. EndPointer is a browser extension for ethical hackers and web developers to find vulnerable endpoints in webpages and linked JavaScript files, including dynamically loaded scripts. It offers customizable scans to enhance web application security.
Note-Taking Solution Burp Suite Obsidian IntegrationEndPointer


gif

gif

PinnedLoading

  1. Hacker-RoadmapHacker-RoadmapPublic

    A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.

    916 72

  2. Burp-Suite-Obsidian-IntegrationBurp-Suite-Obsidian-IntegrationPublic

    Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven note-taking method to streamline bug bounty workflows and enhan…

    Python 25 2

  3. RedTeamRedTeamPublic

    This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.

    177 19

  4. Endpoint-Javascript-ExplorerEndpoint-Javascript-ExplorerPublic

    Powerful JavaScript bookmarklet designed for discovering and analyzing endpoints embedded in JavaScript files across various domains

    8

  5. BlueTeamBlueTeamPublic

    This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.

    42 6

  6. Wayback-CrawlerWayback-CrawlerPublic

    The tool initially discovers subdomains, and subsequently searches the Wayback Machine for all the associated URLs to identify any vulnerable parameters that might have been exposed.

    Python 3 1


[8]ページ先頭

©2009-2025 Movatter.jp