Johnson90512 / Awesome-Security-ResourcesView external linksLinks
This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.
☆94Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for Awesome-Security-Resources
Users that are interested in Awesome-Security-Resources are comparing it to the libraries listed below
Sorting:
- I have collected many Free Resources. Feel free share more resources☆316Feb 1, 2023Updated 3 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 weeks ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆15May 3, 2024Updated last year
- study material used for the 2018 CISSP exam☆12Jun 11, 2018Updated 7 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- ☆18Jun 3, 2017Updated 8 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Small collection about free cybersecurity materials☆37Jul 25, 2021Updated 4 years ago
- ☆19Aug 4, 2021Updated 4 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- ☆40Jul 28, 2024Updated last year
- A repository to store all my recourses and code on my Web 3 education☆37Dec 17, 2024Updated last year
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated 11 months ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆19Nov 14, 2019Updated 6 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- ☆482Aug 12, 2022Updated 3 years ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Collection of writeups on ICS/SCADA security.☆195Oct 19, 2025Updated 3 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- ☆19Sep 24, 2025Updated 4 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- ☆144Jun 9, 2025Updated 8 months ago
- Extract text from your DOCX documents.☆11Feb 10, 2024Updated 2 years ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- ☆260Mar 15, 2024Updated last year
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A spy pixel which can be emedded into web pages or emails.☆108Aug 16, 2024Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jun 14, 2023Updated 2 years ago