CyberSecurityUP / Information-Security-Certifications-MapLinks
☆29Updated 4 years ago
Alternatives and similar repositories for Information-Security-Certifications-Map
Users that are interested in Information-Security-Certifications-Map are comparing it to the libraries listed below
Sorting:
- ☆32Updated 4 years ago
- ☆18Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Updated 6 years ago
- ☆24Updated 4 years ago
- ☆20Updated 3 years ago
- ☆14Updated 4 years ago
- ☆16Updated 4 years ago
- ☆76Updated 4 years ago
- ☆45Updated 4 years ago
- ☆11Updated 4 years ago
- Script to manage and create local pentesting training virtual lab☆50Updated 5 years ago
- ☆18Updated 3 years ago
- ☆27Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 3 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- ☆20Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆40Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated last month
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- Filter URLs to save your time.☆60Updated 3 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 11 months ago
- OSCP tools and notes☆40Updated 6 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- ☆101Updated 4 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆23Updated last month