Trevohack / TryHackMe-Zero-To-Hero
TryHackMe Roadmap
☆22Updated 4 months ago
Related projects: ⓘ
- Manage variables effectively when playing CTFs☆10Updated 4 months ago
- ☆105Updated this week
- 100-Days-of-Hacking☆111Updated last year
- Python for AWAE (Advanced Web Attacks and Exploitation)☆90Updated last year
- All Solutions☆84Updated 4 months ago
- Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)☆141Updated 5 months ago
- cyber security mind maps collection☆83Updated 8 months ago
- ☆48Updated last year
- Complete Roadmap for Penetration Testing☆70Updated this week
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆87Updated 4 months ago
- ☆48Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆66Updated 10 months ago
- Top disclosed reports from HackerOne☆146Updated 3 years ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆72Updated last month
- CEH Practical☆45Updated last year
- Koth - TryHackMe Tricks☆138Updated 10 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆53Updated last year
- INE/eLearnSecurity Web Application Penetration Tester (eWPTv2) Notes☆27Updated 3 months ago
- Projects for security students and professionals☆126Updated 2 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆36Updated 2 years ago
- eJPTv2 Cheatsheet for the exam, with commands and tools shown in the course.☆49Updated last year
- ☆67Updated last year
- Web Application Penetration Testing☆86Updated last month
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆279Updated 8 months ago
- my notes☆141Updated 3 weeks ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆175Updated 9 months ago
- Write-ups and walkthroughs for Hack The Box machines☆29Updated 2 weeks ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆205Updated 3 months ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆224Updated 2 weeks ago
- ☆117Updated 10 months ago