h0tak88r / Sec_Mind_Maps
cyber security mind maps collection
โ213Updated last year
Alternatives and similar repositories for Sec_Mind_Maps
Users that are interested in Sec_Mind_Maps are comparing it to the libraries listed below
Sorting:
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.โ301Updated 2 weeks ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.๐ค๐ป๐โ194Updated last year
- 100-Days-of-Hackingโ129Updated last year
- Complete Roadmap for Penetration Testingโ216Updated 8 months ago
- โ115Updated 4 months ago
- OSCP Cheatsheet by Sai Sathvikโ69Updated last year
- Welcome to the Bug Hunter's Wordlists repository! ๐๐ This repository serves as a comprehensive collection of essential wordlists utilizโฆโ147Updated 11 months ago
- โ199Updated 3 months ago
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and servicesโ309Updated last year
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ81Updated 2 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirementsโ482Updated last month
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioโฆโ118Updated last month
- Top disclosed reports from HackerOneโ151Updated 4 years ago
- This is a resource for anyone looking to learn bug hunting and provides guidance during the study and learning phase.โ26Updated 9 months ago
- โ397Updated 2 years ago
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulneโฆโ194Updated last week
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. Iโฆโ148Updated 5 months ago
- My Private Bug Hunting Methodologyโ294Updated 5 months ago
- Cyber Security Notes, Methodology, Resources and Tipsโ154Updated last week
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ181Updated 4 months ago
- Automate Recon XSS Bug Bountyโ160Updated last week
- Python for AWAE (Advanced Web Attacks and Exploitation)โ94Updated last year
- My notes while studying for the PNPT from TCM Security.โ72Updated last year
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Securโฆโ43Updated 7 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a varโฆโ38Updated last week
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Thโฆโ250Updated last week
- โ315Updated 10 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's namโฆโ91Updated last week
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified Pโฆโ272Updated last month
- โ475Updated last week