A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.
☆558Nov 4, 2024Updated last year
Alternatives and similar repositories for Getting-into-InfoSec-and-Cybersecurity
Users that are interested in Getting-into-InfoSec-and-Cybersecurity are comparing it to the libraries listed below
Sorting:
- A Library of various cybersecurity resources☆2,518Feb 24, 2024Updated 2 years ago
- Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application☆644Apr 10, 2020Updated 5 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,738Oct 20, 2023Updated 2 years ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,884Dec 31, 2025Updated 2 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,732Jan 5, 2026Updated last month
- Current links from the OSINT Inception start-me project☆192May 15, 2023Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,534Mar 18, 2025Updated 11 months ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,664Jun 22, 2025Updated 8 months ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Mar 7, 2023Updated 2 years ago
- ☆1,698Aug 19, 2022Updated 3 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,193Jan 20, 2026Updated last month
- Ricerca e Analisi delle Immagini☆143Mar 12, 2025Updated 11 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,655Sep 8, 2023Updated 2 years ago
- All the deals for InfoSec related software/tools this Black Friday☆4,343Nov 28, 2025Updated 3 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,034Dec 21, 2024Updated last year
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,173Feb 23, 2026Updated last week
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Aug 8, 2021Updated 4 years ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- A Collection of Wordlists for Penetration Testing☆34Dec 13, 2025Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆703Oct 17, 2022Updated 3 years ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,961Jul 12, 2024Updated last year
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,444Jan 4, 2024Updated 2 years ago
- The recursive internet scanner for hackers. 🧡☆9,450Updated this week
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- ☆10May 15, 2020Updated 5 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,055Dec 11, 2024Updated last year
- Script to Automate installtion of Apps ,frida server and moving Burpsuite certificate to root folder☆268Jan 28, 2024Updated 2 years ago
- Incident Response Methodologies 2022☆1,104Apr 11, 2025Updated 10 months ago
- Mind-Maps of Several Things☆2,626Jun 29, 2023Updated 2 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,382Nov 24, 2025Updated 3 months ago
- Ultimate DevSecOps library☆6,613Jul 17, 2025Updated 7 months ago