We1337 / Roadmap-Study-Cyber-SecurityLinks
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆14Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆17Updated this week
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆33Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 3 years ago
- Offensive Security Vault structure for Obsidian☆19Updated 2 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆31Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 5 years ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 weeks ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆18Updated 2 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆80Updated 7 months ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated 2 months ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 8 months ago
- Wiki to collect Red Team infrastructure hardening resources☆30Updated 6 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆13Updated last year
- ☆29Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆29Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 2 years ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆19Updated 3 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆10Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 4 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago