arceuzvx / Cybersecurity_resourcesLinks
A comprehensive collection of free cybersecurity eBooks categorized by topics and updated regularly
☆11Updated 6 months ago
Alternatives and similar repositories for Cybersecurity_resources
Users that are interested in Cybersecurity_resources are comparing it to the libraries listed below
Sorting:
- You'll find all the resources and presentations I have used in my talks and workshops☆12Updated 11 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆29Updated 2 years ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated last month
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 5 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 2 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 10 months ago
- ☆128Updated 5 months ago
- List of questions, answers and random notes for security interviews☆70Updated 4 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 5 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆187Updated last month
- ☆57Updated 4 months ago
- ☆35Updated 7 months ago
- ☆21Updated 6 months ago
- ☆41Updated 10 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆135Updated 3 years ago
- Challenge Python☆19Updated 2 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Updated 6 months ago
- My notes while studying for the PNPT from TCM Security.☆81Updated last year
- ☆242Updated 9 months ago
- ☆233Updated last month
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- ☆35Updated 11 months ago
- ☆42Updated 10 months ago
- An archive of 0day.today exploits☆302Updated 3 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- Notes for OSCP & CPTS.☆41Updated 3 weeks ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆64Updated 11 months ago
- A blind SQL injection brute forcer☆111Updated 6 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 10 months ago