A curated list of free cybersecurity learning resources.
☆142Sep 13, 2025Updated 6 months ago
Alternatives and similar repositories for awesome-free-cybersecurity
Users that are interested in awesome-free-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.☆69Jul 4, 2024Updated last year
- ☆10Sep 3, 2024Updated last year
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- list of TryHackMe Free rooms with a guide to basic pathways.☆12Aug 14, 2023Updated 2 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- ctf writeups by the rounding error team ✏️☆33May 23, 2025Updated 10 months ago
- #! cd /data/data/com.termux/files/usr/bin/bash clear cd data clear echo "Ngapain Ke Sini? siap Siap Ngebucin Ya!" | lolcat echo "Jaw…☆12Dec 1, 2021Updated 4 years ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- LoadHound — Lightweight load testing tool for SQL databases.☆17Aug 8, 2025Updated 7 months ago
- ☆30Sep 1, 2022Updated 3 years ago
- ☆22May 18, 2024Updated last year
- ☆12Apr 18, 2024Updated last year
- An insane list of all dorks taken from everywhere from various different sources.☆784Dec 29, 2025Updated 2 months ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated 11 months ago
- A tool for Subdomain takeovers detection☆26Oct 21, 2022Updated 3 years ago
- Source for Pentester Land☆39Nov 3, 2022Updated 3 years ago
- This is HULK. Http Unbreakable Load king. It is a DOS attack tools.☆16Mar 20, 2018Updated 8 years ago
- BSQLi de coffinxp réécrie en GO, son repos a été reporté en masse, il a donc été fermé.☆13Jul 26, 2024Updated last year
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆14Jun 29, 2025Updated 8 months ago
- ☆24Feb 19, 2026Updated last month
- A curated list of Docker resources☆28Nov 13, 2015Updated 10 years ago
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- Source code and solutions for UofT's 2024 Capture the Flag Competition.☆19Jan 5, 2025Updated last year
- ☆13Apr 25, 2024Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Feb 12, 2022Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆35May 2, 2022Updated 3 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Unlimited Twitter Followers Script, Python☆17Nov 16, 2023Updated 2 years ago
- my nuclei templates #new☆11Jun 24, 2024Updated last year
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆202Jun 17, 2022Updated 3 years ago
- OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,074Jan 25, 2026Updated last month
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- List of Directory Traversal/LFI Payloads Scraped from the Internet☆183Feb 10, 2025Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year