CyberSecurityUP / CyberSecurity-LinkedIn-Materials
☆38Updated last year
Alternatives and similar repositories for CyberSecurity-LinkedIn-Materials:
Users that are interested in CyberSecurity-LinkedIn-Materials are comparing it to the libraries listed below
- ☆66Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆97Updated 3 months ago
- ☆74Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- OWASP based Web Application Security Testing Checklist☆72Updated 9 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- ☆30Updated 3 years ago
- This is a repository for network security tools and technologies.☆96Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- ☆12Updated 3 years ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆12Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆26Updated last year
- ☆78Updated 2 years ago
- ☆88Updated 2 years ago
- ☆29Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆118Updated 2 years ago
- ☆24Updated 3 years ago
- ☆41Updated 4 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- ☆99Updated 3 years ago
- ☆64Updated last year
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- Hi everyone,☆59Updated last year
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆64Updated 2 months ago
- ☆19Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆122Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- ☆44Updated 3 years ago