h0tak88r / Sec_Mind_MapsLinks
cyber security mind maps collection
โ223Updated last year
Alternatives and similar repositories for Sec_Mind_Maps
Users that are interested in Sec_Mind_Maps are comparing it to the libraries listed below
Sorting:
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).โ227Updated 8 months ago
- ๐ฅท SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, etโฆโ311Updated last month
- OSCP Cheatsheet by Sai Sathvikโ80Updated 2 years ago
- Complete Roadmap for Penetration Testingโ251Updated last year
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.๐ค๐ป๐โ212Updated 2 years ago
- 100-Days-of-Hackingโ133Updated 2 years ago
- โ121Updated 11 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.โ569Updated last week
- My notes while studying for the PNPT from TCM Security.โ82Updated last year
- โ316Updated last year
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ91Updated 9 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirementsโ499Updated 5 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure codโฆโ452Updated last week
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a varโฆโ47Updated 6 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)โ100Updated 2 years ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioโฆโ210Updated 2 months ago
- A Personal Collection of Infosec Dorksโ205Updated 2 years ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Thโฆโ263Updated 5 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ257Updated 11 months ago
- โ52Updated 2 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilitiesโ300Updated last year
- Welcome to the Bug Hunter's Wordlists repository! ๐๐ This repository serves as a comprehensive collection of essential wordlists utilizโฆโ151Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and eโฆโ380Updated 2 years ago
- โ205Updated 10 months ago
- โ61Updated 5 years ago
- 100 Hacking Tools and Resourcesโ110Updated 2 years ago
- Hi everyone,โ61Updated 2 years ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. Iโฆโ161Updated last year
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!โ368Updated 2 years ago
- #cheat sheet for OSCPโ294Updated 5 years ago