We1337 / Roadmap-Study-Cyber-SecurityLinks
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆15Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆42Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆90Updated last year
- CTF and Bug Bounty Hunting WriteUps.☆21Updated last month
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆27Updated last year
- ☆43Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆70Updated last year
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆30Updated 3 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆17Updated this week
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆28Updated 2 years ago
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆43Updated 7 months ago
- Ultimate Google Dork Lists OSWP top 10☆57Updated last year
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Updated 3 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆21Updated 2 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆45Updated 3 years ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆68Updated last month
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated 2 years ago
- ☆25Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆81Updated 8 months ago
- ☆17Updated 2 years ago
- Tools and methods that I personally use for Recon and Exploitations☆45Updated 6 months ago
- Chrome extension tool for OSINT & Recon☆56Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆152Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆47Updated this week
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆61Updated 6 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 3 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- Here Are Some Bug Bounty Resource From Twitter☆103Updated 5 months ago