0xsyr0 / CTF-NotesLinks
From Zero To Hero
β36Updated last month
Alternatives and similar repositories for CTF-Notes
Users that are interested in CTF-Notes are comparing it to the libraries listed below
Sorting:
- My notes while studying for the PNPT from TCM Security.β79Updated last year
- π₯· SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, etβ¦β257Updated this week
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Examβ56Updated 2 years ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.π€π»πβ209Updated last year
- OSCP Cheatsheet by Sai Sathvikβ73Updated last year
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified Pβ¦β332Updated 2 months ago
- β71Updated 7 months ago
- Here are all the notes I personally took while studying for the OSCP which helped me pass.β92Updated 3 years ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windowsβ¦β198Updated 4 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.β74Updated 2 years ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controllβ¦β111Updated 6 months ago
- β432Updated 2 years ago
- Certification Cheatsheetsβ190Updated 2 years ago
- Collection of Notes and CheatSheets used for Red teaming Certsβ459Updated 2 years ago
- Cyber Security Interview Questions ( and some answers )β76Updated last year
- my notesβ220Updated 7 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-upβ¦β65Updated last month
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS attaβ¦β210Updated last year
- β314Updated last year
- β347Updated 2 years ago
- β52Updated 2 years ago
- Projects for security students and professionalsβ200Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.β513Updated last week
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresseβ¦β243Updated last month
- Complete Roadmap for Penetration Testingβ241Updated 11 months ago
- β70Updated 3 years ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incideβ¦β108Updated 6 months ago
- Knowledge Management for Offensive Security Professionals Official Repositoryβ148Updated 6 months ago
- Certified Red Team Operatorβ423Updated 3 years ago
- β241Updated 7 months ago