A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.
☆595Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for 5pillars
Users that are interested in 5pillars are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,064Feb 12, 2023Updated 3 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,408Jun 30, 2025Updated 10 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,544May 11, 2026Updated last week
- A list of resources for those interested in getting started in bug bounties☆12,004Jul 23, 2024Updated last year
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sample pentest report provided by TCM Security☆1,387Mar 18, 2022Updated 4 years ago
- A tool for parsing breached passwords☆2,112Mar 21, 2024Updated 2 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆806Oct 23, 2020Updated 5 years ago
- Web recon script. No need to fear, sumrecon is here!☆400Oct 10, 2022Updated 3 years ago
- Notes for Beginner Network Pentesting Course☆6,262Sep 21, 2022Updated 3 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19…☆2,107Feb 11, 2026Updated 3 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Jan 3, 2022Updated 4 years ago
- Compilation of Resources from TCM's OSINT Course☆1,120May 2, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆431Feb 2, 2022Updated 4 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,993Jan 28, 2026Updated 3 months ago
- Resources for TCM Security Linux 101 course☆316Jul 4, 2023Updated 2 years ago
- A collection of personal dotfiles and configurations. Feel free to snoop around and use what interests you.☆13May 30, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,765Apr 22, 2026Updated 3 weeks ago
- game of active directory☆7,818Mar 12, 2026Updated 2 months ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆33Jun 10, 2021Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,612Jan 18, 2026Updated 4 months ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,817Aug 6, 2023Updated 2 years ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆586Oct 23, 2020Updated 5 years ago
- List of Awesome Red Teaming Resources☆7,916Dec 28, 2023Updated 2 years ago
- Labs for Practical Malware Analysis & Triage☆1,120Mar 29, 2026Updated last month
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,769Feb 9, 2023Updated 3 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,823Jul 29, 2025Updated 9 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,971Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,177Aug 16, 2023Updated 2 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆26,149Jan 25, 2026Updated 3 months ago
- The Bug Hunters Methodology☆4,325Aug 1, 2023Updated 2 years ago
- ☆2,028Feb 25, 2026Updated 2 months ago
- A curated list of awesome infosec courses and training resources.☆5,661Nov 21, 2025Updated 5 months ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,106Mar 8, 2026Updated 2 months ago