ForgottenSec / Transitioning_Into_InfoSecLinks
So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them to Academia. Compiling those and sharing with Academia is the goal of this resource
☆54Updated 7 years ago
Alternatives and similar repositories for Transitioning_Into_InfoSec
Users that are interested in Transitioning_Into_InfoSec are comparing it to the libraries listed below
Sorting:
- ☆92Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Common Findings Database☆101Updated 6 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- ☆26Updated 8 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- ☆51Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- ☆52Updated 5 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- ☆61Updated 7 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Updated 7 years ago
- OSCP Scripts☆14Updated 9 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- ☆26Updated 9 years ago
- penetration testing scripts☆136Updated 6 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- A repository for large scripts from my book.☆161Updated 3 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆90Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- ☆89Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Automated enumeration☆30Updated 4 years ago