A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guidance
☆1,910Oct 6, 2025Updated 4 months ago
Alternatives and similar repositories for Cybersecurity-Mastery-Roadmap
Users that are interested in Cybersecurity-Mastery-Roadmap are comparing it to the libraries listed below
Sorting:
- Learning resources for cybersecurity including youtube, github, books, videos, courses, labs, articles etc. at one place☆63Dec 28, 2024Updated last year
- ☆16Jan 21, 2025Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- A curated list of cybersecurity tools and resources.☆2,048Feb 3, 2026Updated last month
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated last year
- This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concept…☆13,588Nov 18, 2025Updated 3 months ago
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆11Jan 27, 2025Updated last year
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆94Nov 2, 2023Updated 2 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- Free Cybersecurity tutorials for beginners with 351 interactive lessons. Easy-to-follow programming guides with hands-on practice exercis…☆30Oct 23, 2025Updated 4 months ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- 这是一个用Go语言编写的Linux权限维持工具,包含多种权限维持技术,仅供安全研究和渗透测试使用。☆33Aug 19, 2025Updated 6 months ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆23Sep 23, 2024Updated last year
- A powerful Open Source Intelligence (OSINT) tool for analyzing digital footprints across multiple platforms. This tool helps researchers …☆158Dec 5, 2024Updated last year
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆44Feb 26, 2026Updated last week
- Honeypot Service Simulator☆22Sep 9, 2024Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆29Jul 6, 2024Updated last year
- ☆846Nov 4, 2024Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆252Mar 21, 2024Updated last year
- Cybersecurity Career Path☆2,002Aug 10, 2025Updated 6 months ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆50Jul 1, 2024Updated last year
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆32Nov 13, 2025Updated 3 months ago
- A comprehensive TryHackMe learning path with organized sections on Introductory Rooms, Linux Fundamentals, Networking, Forensics, CTF cha…☆298Sep 21, 2024Updated last year
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆176Feb 20, 2026Updated last week
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- ☆14Nov 8, 2024Updated last year
- Ultra-lightweight HTTP file server for directory browsing and local development☆45Oct 11, 2025Updated 4 months ago
- ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).☆28Jan 19, 2026Updated last month
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- Red Team Coin for crypto-mining operations.☆23Updated this week
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- My Start Page for Browser☆109Jul 12, 2025Updated 7 months ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- Using MCP is fun with Cyberbro!☆19Jan 27, 2026Updated last month
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆30Feb 18, 2026Updated 2 weeks ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago