Ingrambtp3 / IAM--PROJECTS
โ12Updated 3 weeks ago
Alternatives and similar repositories for IAM--PROJECTS:
Users that are interested in IAM--PROJECTS are comparing it to the libraries listed below
- Cybersecurity Black Friday Deals repository! ๐ก๏ธ๐โ43Updated last year
- Technical Challenge (Controls Deployment)โ25Updated 2 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.โ50Updated 3 years ago
- Python for AWAE (Advanced Web Attacks and Exploitation)โ93Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam processโ25Updated last year
- OSCP Cheatsheet by Sai Sathvikโ68Updated last year
- โ87Updated 2 years ago
- 100 Hacking Tools and Resourcesโ104Updated last year
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.๐ค๐ป๐โ191Updated last year
- A collection of tools that I use in CTF's or for assessmentsโ97Updated 2 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.โ14Updated 2 months ago
- List of questions, answers and random notes for security interviewsโ69Updated 3 years ago
- How to Crack an Entry Level Job in Cybersecurity! - 2024โ21Updated last year
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-upโฆโ60Updated 4 months ago
- CEH Practical Resources, Learning, Tutorials | Certified Ethical Hackerโ32Updated 4 years ago
- A simple pentest container equipped with common python pentest tools.โ41Updated 2 months ago
- CTF and Bug Bounty Hunting WriteUps.โ19Updated 7 months ago
- Web Penetration Testing Course Materialsโ32Updated 11 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectโฆโ75Updated 7 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloudโ118Updated 2 years ago
- cyber security mind maps collectionโ210Updated last year
- My notes while studying for the PNPT from TCM Security.โ70Updated last year
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based tโฆโ121Updated 3 months ago
- โ41Updated 4 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.โ90Updated 4 months ago
- Minimalist notes for CEH-practical Cert.โ32Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Courseโ122Updated 3 years ago
- Hi everyone,โ59Updated last year
- Challenge Pythonโ19Updated last year
- This project automates SOC workflows using Wazuh, Shuffle, and TheHive. It involves setting up a Windows 10 client with Sysmon and Ubuntuโฆโ11Updated 10 months ago