A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.
☆595Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for 5pillars
Users that are interested in 5pillars are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,049Feb 12, 2023Updated 3 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,405Jun 30, 2025Updated 9 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,505Mar 22, 2026Updated 3 weeks ago
- A list of resources for those interested in getting started in bug bounties☆11,964Jul 23, 2024Updated last year
- Modules for my C2 course students to use for their own projects.☆72Jun 13, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sample pentest report provided by TCM Security☆1,375Mar 18, 2022Updated 4 years ago
- A tool for parsing breached passwords☆2,103Mar 21, 2024Updated 2 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆799Oct 23, 2020Updated 5 years ago
- Web recon script. No need to fear, sumrecon is here!☆399Oct 10, 2022Updated 3 years ago
- Notes for Beginner Network Pentesting Course☆6,258Sep 21, 2022Updated 3 years ago
- An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19…☆2,090Feb 11, 2026Updated 2 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Jan 3, 2022Updated 4 years ago
- Compilation of Resources from TCM's OSINT Course☆1,112May 2, 2024Updated last year
- ☆432Feb 2, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,971Jan 28, 2026Updated 2 months ago
- Resources for TCM Security Linux 101 course☆313Jul 4, 2023Updated 2 years ago
- A collection of personal dotfiles and configurations. Feel free to snoop around and use what interests you.☆13May 30, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,854Apr 8, 2026Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,576Jan 18, 2026Updated 3 months ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,644Aug 6, 2023Updated 2 years ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- List of Awesome Red Teaming Resources☆7,883Dec 28, 2023Updated 2 years ago
- Labs for Practical Malware Analysis & Triage☆1,107Mar 29, 2026Updated 3 weeks ago
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,757Feb 9, 2023Updated 3 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,814Jul 29, 2025Updated 8 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,365Updated this week
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,176Aug 16, 2023Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,834Jan 25, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- The Bug Hunters Methodology☆4,273Aug 1, 2023Updated 2 years ago
- ☆2,004Feb 25, 2026Updated last month
- A curated list of awesome infosec courses and training resources.☆5,619Nov 21, 2025Updated 4 months ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,086Mar 8, 2026Updated last month
- A curated list of awesome OSCP resources☆3,391Apr 28, 2024Updated last year
- A list of web application security☆6,819Apr 10, 2026Updated last week