harisqazi1 / CybersecurityView external linksLinks
This is meant to assist people looking for entry level Cybersecurity jobs, as well as study up on skills that they can put on their resume.
☆1,326Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for Cybersecurity
Users that are interested in Cybersecurity are comparing it to the libraries listed below
Sorting:
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,991Mar 13, 2024Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,963Jan 14, 2023Updated 3 years ago
- Cybersecurity Career Path☆1,979Aug 10, 2025Updated 6 months ago
- 🕵️♂️ Offensive Google framework.☆18,410Feb 5, 2026Updated last week
- a list of cybersecurity internships☆573Dec 12, 2025Updated 2 months ago
- An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19…☆2,050Sep 1, 2022Updated 3 years ago
- A curriculum for a high school cyber security course.☆776Dec 17, 2023Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,301Jun 1, 2023Updated 2 years ago
- A Library of various cybersecurity resources☆2,515Feb 24, 2024Updated last year
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,578Jun 20, 2024Updated last year
- 100 Days of Code - The Complete Python Pro Bootcamp☆1,738Jul 5, 2022Updated 3 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,862May 5, 2025Updated 9 months ago
- This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, …☆25,036Feb 6, 2026Updated last week
- articles☆13,691Apr 3, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆6,999Jun 25, 2025Updated 7 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,133Jul 15, 2024Updated last year
- A list of helpful cybersecurity / infosec resources☆1,353Nov 19, 2024Updated last year
- A list of resources for those interested in getting started in bug bounties☆11,782Jul 23, 2024Updated last year
- A curated list of resources for Frontend development☆2,311Mar 4, 2024Updated last year
- Roadmap to becoming an Artificial Intelligence Expert in 2022☆30,728Sep 12, 2025Updated 5 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,818Sep 10, 2025Updated 5 months ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,663Jan 23, 2025Updated last year
- Infection Monkey - An open-source adversary emulation platform☆6,944May 1, 2025Updated 9 months ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆20,396Feb 3, 2026Updated last week
- Red Team K8S Adversary Emulation Based on kubectl☆824May 28, 2021Updated 4 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,238Updated this week
- An awesome list of awesome YouTubers that teach about technology. Tutorials about web development, computer science, machine learning, ga…☆7,233Nov 30, 2025Updated 2 months ago
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,349Jun 25, 2024Updated last year
- Comprehensive Python Cheatsheet☆38,221Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,464Nov 16, 2025Updated 3 months ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,201Jan 31, 2026Updated 2 weeks ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,787Updated this week
- A collection of essential and foundational cybersecurity knowledge, thoughtfully organized for easy comprehension.☆1,419Nov 10, 2025Updated 3 months ago
- Do you want to LEARN NEW STUFF for FREE? Don't worry, with the power of web-scraping and automation, this script will find the necessary …☆3,271Oct 16, 2025Updated 4 months ago
- A collection of custom security tools for quick needs.☆3,286May 1, 2023Updated 2 years ago
- How to systematically secure anything: a repository about security engineering☆10,224Mar 7, 2023Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,000Feb 12, 2023Updated 3 years ago
- a recommendation list of math courses for people with no math background.☆11Mar 2, 2021Updated 4 years ago