ForgottenSec / Transitioning_Into_InfoSecLinks
So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them to Academia. Compiling those and sharing with Academia is the goal of this resource
☆54Updated 7 years ago
Alternatives and similar repositories for Transitioning_Into_InfoSec
Users that are interested in Transitioning_Into_InfoSec are comparing it to the libraries listed below
Sorting:
- ☆26Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- The documents☆56Updated 7 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- ☆52Updated 4 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 10 months ago
- 504 VSAgent☆23Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- ☆92Updated 6 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Primer on Information Security - ported from my blog.☆28Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆108Updated 8 years ago
- Hacking challenges☆31Updated 7 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago