We1337 / Roadmap-Study-Cyber-SecurityLinks
Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆14Updated last year
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- CTF and Bug Bounty Hunting WriteUps.☆21Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆41Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆85Updated 11 months ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆20Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆55Updated last year
- Ultimate Google Dork Lists OSWP top 10☆57Updated last year
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆29Updated last year
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆19Updated this week
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆27Updated 2 years ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆70Updated last year
- ☆43Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Updated 2 years ago
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆26Updated 4 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆30Updated 2 years ago
- Here Are Some Bug Bounty Resource From Twitter☆101Updated 3 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Updated 4 years ago
- This small script can download or update all the GitHub repo of your choice.☆21Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 7 months ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆38Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆59Updated 5 months ago
- All In One, Fast, Easy Recon Tool☆87Updated 3 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 11 months ago
- ☆86Updated 8 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆38Updated 2 years ago
- ☆25Updated last year
- ☆17Updated 2 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15Updated 2 years ago