Prashant-Bhapkar / Awesome-Security-Resources
Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)
☆27Updated 2 years ago
Alternatives and similar repositories for Awesome-Security-Resources:
Users that are interested in Awesome-Security-Resources are comparing it to the libraries listed below
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆10Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆81Updated 6 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 2 years ago
- ☆37Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆43Updated 4 years ago
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆43Updated last month
- Chrome extension tool for OSINT & Recon☆53Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆92Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆17Updated 2 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆25Updated 2 years ago
- Minimalist notes for CEH-practical Cert.☆32Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- ☆55Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- A summary of the most abbreviations I encountered so far☆22Updated last week
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆63Updated 2 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆90Updated 4 months ago
- Hacking and Cyber Security Ebooks | For More Visit -☆85Updated 5 years ago
- OSINT Tools for the Dark Web☆153Updated 3 weeks ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆35Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆70Updated last year
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- ☆78Updated 2 years ago
- RedTeam - Red Team Tools☆44Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆70Updated 4 months ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆17Updated last week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆133Updated last year
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆92Updated 2 months ago