
CyberSecurity
This repository contains the best books for both bug hunters and people studying cybersecurity.

Service enumeration is an essential stage in ethical hacking and penetration testing. It is performed after the initial information gathering and scanning phases.

What is Information Gathering Information gathering is an important early step in cybersecurity and ethical hacking. It is the process of collecting and organizing information about a target system before performing deeper security testing.

This runbook details a hands-on simulation of exploiting the EternalBlue vulnerability (CVE-2017-0144), targeting an unpatched Windows 7 machine in a controlled lab environment using Metasploit.

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device (HID attacks ).

This repository contains a curated collection of books, videos, and tools for learning Web Security Bug Bounty.
Kali Linux quietly ships with some of the most practical and battle-tested wordlists you can use as a beginner or professional pentester.