We1337 / Roadmap-Study-Cyber-SecurityLinks
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆14Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆30Updated 2 years ago
- CTF and Bug Bounty Hunting WriteUps.☆20Updated 3 weeks ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆19Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆84Updated 10 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆18Updated this week
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆52Updated last year
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆28Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆70Updated 11 months ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Updated 2 years ago
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 4 years ago
- Ultimate Google Dork Lists OSWP top 10☆55Updated last year
- Chrome extension tool for OSINT & Recon☆55Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆27Updated 2 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆27Updated 2 years ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆19Updated last year
- A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴☆148Updated this week
- 🔒 TryHackMe - Home Work ! 📝☆38Updated 8 months ago
- Hacking and Cyber Security Ebooks | For More Visit -☆84Updated 5 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 11 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆42Updated last month
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆38Updated 4 months ago
- ☆17Updated 2 years ago
- All In One, Fast, Easy Recon Tool☆88Updated 3 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated 2 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆37Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆99Updated 10 months ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆103Updated 2 years ago
- My Gitbook CyberSec Notes☆19Updated last month