A curated list of awesome infosec blog posts, courses, books and more!
☆105May 27, 2020Updated 5 years ago
Alternatives and similar repositories for awesome-infosec
Users that are interested in awesome-infosec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- List of Awesome Red Teaming Resources☆46Jan 9, 2018Updated 8 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- ☆10May 1, 2020Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆36Jan 8, 2021Updated 5 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago
- Check List☆80Jul 16, 2022Updated 3 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- ☆43Feb 26, 2019Updated 7 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- curl based tool to send messages using Microsoft Exchange ActiveSync protocol☆11Oct 18, 2019Updated 6 years ago
- Awesome Lists☆13Feb 25, 2019Updated 7 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- 🤙 Security Trivia that rare people know.☆165Dec 7, 2019Updated 6 years ago
- My collection of Honeypot resources 💻🍯☆27Aug 31, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 5 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- A comprehensive curated list of available Blockchain Bug Bounty Programs.☆79Feb 22, 2019Updated 7 years ago
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- XSS Payload without Anything.☆105Jun 28, 2019Updated 6 years ago
- ☆20Aug 15, 2020Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- List of nixers.net user sites☆16Jan 2, 2023Updated 3 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Webapp to search tips on Twitter through #bugbountytips☆72Dec 2, 2022Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago