OP 19 January, 2023 - 02:37 PM
If you practice the wonderful discipline of Bug Bounty, you probably already have a handy toolbox.
But if you're just starting out, the good news is that ethical hacker Kamil Vavra has compiled an "Awesome List" like only Github can host.
This list contains all the tools to recognize subdomains, technologies, ports...etc. and also exploitation such as command injection, SQL injection, XSS, XXE, File Inclusion...etc.
You'll have hours to look at and test all this and I think it will save you a lot of time.
To be discovered here:
Leave a like if this post helps you
But if you're just starting out, the good news is that ethical hacker Kamil Vavra has compiled an "Awesome List" like only Github can host.
This list contains all the tools to recognize subdomains, technologies, ports...etc. and also exploitation such as command injection, SQL injection, XSS, XXE, File Inclusion...etc.
You'll have hours to look at and test all this and I think it will save you a lot of time.
To be discovered here:
Leave a like if this post helps you