We1337 / Roadmap-Study-Cyber-Security
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆11Updated 11 months ago
Alternatives and similar repositories for Roadmap-Study-Cyber-Security:
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆35Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- RedTeam - Red Team Tools☆41Updated 2 years ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 3 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- Spaghetti - Web Application Security Scanner☆19Updated 7 years ago
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆38Updated last month
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆30Updated last year
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆14Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 2 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated 11 months ago
- Web application pentesting recon☆23Updated 4 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated 2 months ago
- Source of swisskyrepo.github.io - Public☆21Updated 4 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 5 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 2 months ago
- This repository contains the files that provide the upload functionality in the IIS Server☆28Updated 3 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated last year
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 37 common web applicatio…☆22Updated last year
- List of sources for cybersecurity news☆36Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆20Updated last year
- ☆19Updated last year
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Updated 6 years ago