h0tak88r / Sec_Mind_MapsLinks
cyber security mind maps collection
โ222Updated last year
Alternatives and similar repositories for Sec_Mind_Maps
Users that are interested in Sec_Mind_Maps are comparing it to the libraries listed below
Sorting:
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.๐ค๐ป๐โ210Updated last year
- OSCP Cheatsheet by Sai Sathvikโ75Updated last year
- ๐ฅท SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, etโฆโ266Updated last week
- โ119Updated 8 months ago
- Complete Roadmap for Penetration Testingโ242Updated last year
- 100-Days-of-Hackingโ133Updated 2 years ago
- โ314Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.โ535Updated last week
- This Repositories contains list of One Liners with Descriptions and Installation requirementsโ492Updated 2 months ago
- My notes while studying for the PNPT from TCM Security.โ79Updated last year
- 100 Hacking Tools and Resourcesโ111Updated 2 years ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure codโฆโ399Updated last month
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!โ367Updated 2 years ago
- โ433Updated 2 years ago
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified Pโฆโ335Updated 2 months ago
- #cheat sheet for OSCPโ291Updated 5 years ago
- โ203Updated 7 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a varโฆโ45Updated 3 months ago
- Cyber Security Notes, Methodology, Resources and Tipsโ184Updated this week
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Thโฆโ259Updated 2 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ233Updated 8 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioโฆโ170Updated 2 weeks ago
- โ52Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and eโฆโ351Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilitiesโ298Updated last year
- This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your leโฆโ58Updated 2 months ago
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ87Updated 6 months ago
- Cybersecurity Resourcesโ303Updated 3 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)โ98Updated 2 years ago
- My curated list of resources for OSCP preperationโ252Updated last year