0xsyr0 / Cybersecurity-Glossary
A summary of the most abbreviations I encountered so far
☆22Updated last week
Alternatives and similar repositories for Cybersecurity-Glossary:
Users that are interested in Cybersecurity-Glossary are comparing it to the libraries listed below
- Web Hacking and Red Teaming MindMap☆72Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆26Updated last year
- Red Teaming tools and techniques☆52Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆18Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆30Updated last year
- ☆78Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- ☆39Updated 4 months ago
- ☆26Updated 2 years ago
- ☆53Updated last month
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆32Updated last week
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆61Updated 4 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆32Updated 11 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆71Updated last year
- ☆96Updated 3 years ago
- Field guide to gather low-hanging fruits☆13Updated last month
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 2 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated 2 years ago
- ☆21Updated last year
- ☆41Updated 4 months ago
- ☆76Updated 3 years ago
- ☆20Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 6 months ago