abathelt / Resources
Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware
☆32Updated last week
Alternatives and similar repositories for Resources:
Users that are interested in Resources are comparing it to the libraries listed below
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆40Updated last month
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆58Updated last month
- ☆78Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆121Updated 2 years ago
- Cybersecurity courses I recommand☆13Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆94Updated 2 weeks ago
- ☆127Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆68Updated 10 months ago
- Slides for my conference talks☆43Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆51Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆42Updated 3 years ago
- Minimalist notes for CEH-practical Cert.☆30Updated 2 years ago
- A list of OSINT Resources☆46Updated last year
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆46Updated 3 years ago
- This Repo will help you to prepare better for CEH - Practical Exam☆49Updated 10 months ago
- Your Guide to browse Onine sites☆76Updated 3 months ago
- ☆19Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆42Updated 2 years ago
- ☆41Updated 3 years ago
- This is a repository for network security tools and technologies.☆93Updated 2 years ago
- ☆50Updated last year
- ☆77Updated last year
- eLearnSecurity Certified Exploit Development☆101Updated 3 years ago
- Collection of some pentesting and bugbounty resources☆43Updated 2 years ago
- XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible lin…☆20Updated 4 years ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated last year
- This is a Cheatsheet for eJPT.☆17Updated 4 years ago
- ☆85Updated 2 years ago