☆66Jul 3, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Security-Roadmap-from-0
Users that are interested in Cyber-Security-Roadmap-from-0 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆389Oct 25, 2025Updated 5 months ago
- ☆735Sep 24, 2024Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 4 years ago
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆130Sep 22, 2022Updated 3 years ago
- List of commands and techniques to while conducting any kind of hacking :)☆136Oct 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆214Nov 27, 2023Updated 2 years ago
- Solving Sudoku Puzzles With Computer Vision And Neural Networks☆10Jan 17, 2021Updated 5 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Apr 8, 2026Updated last week
- This repo contains all the code needed to run the Cognito Vue workshop☆14Jul 16, 2021Updated 4 years ago
- This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting …☆15Feb 17, 2023Updated 3 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆16Mar 3, 2024Updated 2 years ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆75Jan 3, 2026Updated 3 months ago
- ☆33Jan 19, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆29Aug 14, 2025Updated 8 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Apr 7, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆74Dec 19, 2022Updated 3 years ago
- ☆15Aug 25, 2021Updated 4 years ago
- A curated list of cyber security resources and tools.☆501Mar 26, 2026Updated 3 weeks ago
- ☆14Dec 15, 2023Updated 2 years ago
- Pure Python implementation of an event dispatcher☆12Jul 9, 2023Updated 2 years ago
- Open-source Twitter collection and archiving tool for tracking specific topics and collecting bulk data.☆14Feb 12, 2023Updated 3 years ago
- Simple node.js linux only keylogger using events☆59Apr 5, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆12Dec 21, 2024Updated last year
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆230Jan 27, 2025Updated last year
- Aave Umbrella smart contracts☆20Feb 17, 2026Updated 2 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆177Feb 22, 2026Updated last month
- Market Arbitrage Dual-Listing Algorithmic Delta (Neutral) is a delta-neutral market-making algorithm that trades on the illiquid market …☆13Dec 30, 2021Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,840Feb 13, 2026Updated 2 months ago
- Profile to time function calls with context in AdonisJS☆14Sep 7, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you…☆432Oct 1, 2020Updated 5 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- ☆15Jan 4, 2021Updated 5 years ago
- Knex.js module for Nest framework (node.js) ⚙☆15Jan 24, 2023Updated 3 years ago
- Live Preview☆19Feb 28, 2025Updated last year
- DockerBooks☆13Jun 2, 2018Updated 7 years ago
- ☆11Mar 12, 2023Updated 3 years ago