We1337 / Roadmap-Study-Cyber-SecurityLinks
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆14Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆30Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆40Updated 3 years ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆81Updated 10 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆24Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 11 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆70Updated 11 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆19Updated 2 years ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆18Updated this week
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆98Updated 10 months ago
- Chrome extension tool for OSINT & Recon☆54Updated last year
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 4 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆41Updated last month
- ☆17Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- 🔒 TryHackMe - Home Work ! 📝☆38Updated 7 months ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆20Updated 10 months ago
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆27Updated last year
- A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴☆147Updated this week
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆35Updated 2 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆26Updated 2 years ago
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆26Updated 4 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆145Updated 10 months ago
- Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server☆80Updated last year
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- This is a simple Cheat Sheet which can be helpful while pentesting☆49Updated 2 years ago
- Hacking and Cyber Security Ebooks | For More Visit -☆85Updated 5 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Updated 11 months ago