We1337 / Roadmap-Study-Cyber-SecurityLinks
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆14Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆42Updated 3 years ago
- CTF and Bug Bounty Hunting WriteUps.☆21Updated 3 weeks ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆38Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆87Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆28Updated 2 years ago
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆41Updated 6 months ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆19Updated this week
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆29Updated last year
- Personal pentest notes and playbooks<3☆30Updated 3 weeks ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆30Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆21Updated 2 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆44Updated 3 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆44Updated last week
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆68Updated last month
- Tools for understanding other people's code☆141Updated 2 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆38Updated 2 years ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆19Updated last year
- Here Are Some Bug Bounty Resource From Twitter☆101Updated 4 months ago
- HackLiners: CyberSec/BugHunting OneLiners☆60Updated last year
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆26Updated 4 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- Chrome extension tool for OSINT & Recon☆56Updated last year
- ☆43Updated last year
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆105Updated last year
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pages☆190Updated 2 years ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆69Updated 8 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆70Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year