gokhangokcen1 / cyber-security-roadmapView external linksLinks
Cyber Security certifications and free resources for them
☆52Sep 7, 2024Updated last year
Alternatives and similar repositories for cyber-security-roadmap
Users that are interested in cyber-security-roadmap are comparing it to the libraries listed below
Sorting:
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆43Updated this week
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆35Dec 27, 2022Updated 3 years ago
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- ☆12Nov 29, 2024Updated last year
- Roadmap to become a Linux-Fine☆10Jul 13, 2024Updated last year
- Enigma Machine in C☆12Nov 1, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 8 months ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 6 months ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- A minimalist microblogging platform 🐦🔇☆10Jan 11, 2026Updated last month
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated last month
- Universal prompt for Power users 💪🌈☆19May 14, 2025Updated 9 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated last year
- Exfiltrate data using ping and PowerShell, no admin access required☆14Mar 26, 2024Updated last year
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- WordPress Checklist☆12Jun 5, 2019Updated 6 years ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Jul 1, 2024Updated last year
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- the collection of all useful extensions that are used in web hacking & Bug Bounty Hunting☆10Sep 4, 2023Updated 2 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- HTML & CSS practices for web dev starters☆13Nov 25, 2022Updated 3 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- ☆13Jun 26, 2024Updated last year
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Systematic Program Design (all 3 parts)☆12Jun 6, 2020Updated 5 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Advanced Hunting Queries☆20Dec 11, 2025Updated 2 months ago
- ☆15Oct 6, 2024Updated last year
- ☆827Nov 4, 2024Updated last year
- ☆12Dec 11, 2022Updated 3 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- My bitcoin fork with many useful work branches for different purposes.☆15Sep 15, 2018Updated 7 years ago