We1337 / Roadmap-Study-Cyber-Security
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆13Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆17Updated last month
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 5 months ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆38Updated last year
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 8 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated last year
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆23Updated last year
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆15Updated 2 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Updated 6 years ago
- RedTeam - Red Team Tools☆44Updated 2 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆32Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- ☆16Updated 2 years ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 2 weeks ago
- Chrome extension tool for OSINT & Recon☆53Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆80Updated 7 months ago
- Here I am trying to show you some cheat-sheet of nmap. Which may help you on penetration testing and bug hunting.☆21Updated 3 years ago
- ☆19Updated 8 months ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆19Updated 3 years ago
- OSCP Preperation☆14Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆20Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 4 months ago