carlcastanas / Cybersecurity-RoadmapView external linksLinks
☆827Nov 4, 2024Updated last year
Alternatives and similar repositories for Cybersecurity-Roadmap
Users that are interested in Cybersecurity-Roadmap are comparing it to the libraries listed below
Sorting:
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- ☆731Sep 24, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Cybersecurity Resources☆318May 25, 2025Updated 8 months ago
- Cyber Security certifications and free resources for them☆52Sep 7, 2024Updated last year
- cyber security mind maps collection☆226Jan 1, 2024Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆43Updated this week
- ☆68Jul 3, 2023Updated 2 years ago
- Cybersecurity Career Path☆1,979Aug 10, 2025Updated 6 months ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆885Aug 28, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concept…☆13,171Nov 18, 2025Updated 2 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆883Dec 28, 2025Updated last month
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 7 months ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- ☆25Dec 28, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Aug 9, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Feb 14, 2025Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Jan 7, 2024Updated 2 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,734Aug 9, 2025Updated 6 months ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated last month
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,166Feb 3, 2026Updated last week
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,767Sep 11, 2025Updated 5 months ago
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆380Oct 25, 2025Updated 3 months ago
- This repo is about Active Directory Advanced Threat Hunting☆649Feb 17, 2025Updated 11 months ago