This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cybersecurity, bug bounty, API security, cloud security, and more. All the resources belong to their respective copyright owners and not to me.
☆573Jan 22, 2026Updated 3 months ago
Alternatives and similar repositories for My-CyberSecurity-Store
Users that are interested in My-CyberSecurity-Store are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Documenting all the sources from where I'm learning Mobile(adnroid/IOS) bug bounty so if another researcher want to start with mobile bug…☆42Updated this week
- Some great ebook for hacking☆30Sep 11, 2025Updated 7 months ago
- ☆18Oct 1, 2025Updated 7 months ago
- A collection of FREE cyber security books☆628Jul 14, 2025Updated 9 months ago
- just some notes on different computer science topics (linux, windows, networks, cybersecurity, machine learning...)☆20Dec 29, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Cheat Sheets is a collection of various cheat sheets for Git, Docker, Chef and many others.☆11May 14, 2020Updated 5 years ago
- DriveWealth's OpenAPI Specification☆15Apr 4, 2025Updated last year
- ☆20Sep 22, 2025Updated 7 months ago
- HackingNotes☆19Nov 1, 2023Updated 2 years ago
- 15,000 most of common SSID names from https://wigle.net/stats#ssidstats☆11Nov 26, 2025Updated 5 months ago
- Bash Shell Scripting for Pentesters, published by Packt☆51Mar 28, 2026Updated last month
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆51Jan 31, 2026Updated 3 months ago
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- ☆2,251Sep 20, 2023Updated 2 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Apr 30, 2025Updated last year
- ☆11Dec 30, 2020Updated 5 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,860Dec 14, 2023Updated 2 years ago
- I will share my public tools here and strive to keep them updated in the future. Don't forget to give them a star! Your support is apprec…☆73Feb 4, 2026Updated 3 months ago
- Reverse Engineering 4 Fun & Profit☆25May 27, 2025Updated 11 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Here are all the notes I personally took while studying for the OSCP which helped me pass.☆91Dec 4, 2021Updated 4 years ago
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- Misc notes from Google's Cybersecurity Professional Certificate☆83Aug 6, 2024Updated last year
- POC | Steal user WhatsApp information/data☆75May 10, 2025Updated 11 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆18Jul 17, 2025Updated 9 months ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆86Apr 11, 2026Updated 3 weeks ago
- ☆18Apr 27, 2023Updated 3 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Nov 2, 2024Updated last year
- ☆14Feb 25, 2025Updated last year
- Intelligence gathering framework☆15Jul 23, 2015Updated 10 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- TechackZ is a powerful web technology detection and vulnerability assessment tool that combines the capabilities of Wappalyzer and Nuclei…☆67Jun 4, 2025Updated 11 months ago
- EthicalHacking, Python, Nmap, Metasploit☆311Oct 17, 2020Updated 5 years ago
- Bug Bounty Resources from Scratch to start Hunting Bugs☆37Feb 21, 2025Updated last year