This repository stores various roadmap(Mindmaps) for bug bounty Hunter, pentester, offensive(red team), defensive(blue team) and security Professional people
☆58May 11, 2022Updated 3 years ago
Alternatives and similar repositories for security-mindmap
Users that are interested in security-mindmap are comparing it to the libraries listed below
Sorting:
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- Online test is available 👉☆12Updated this week
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- word-list, payloads , Resources☆28Oct 17, 2025Updated 5 months ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆55Dec 21, 2020Updated 5 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 7 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- windows-kernel-exploits Windows平台提权漏洞集合☆24Jul 29, 2021Updated 4 years ago
- ☆12Jul 5, 2023Updated 2 years ago
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies☆19Jul 3, 2022Updated 3 years ago
- Additional nuclei templates☆38Oct 16, 2023Updated 2 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- ☆36Jun 23, 2022Updated 3 years ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆78Dec 3, 2023Updated 2 years ago
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago
- Use these VDP in Bug Hunting, These VDP are checked and verified by Bug Hunters☆20Aug 9, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- XSSor is a semi-automatic reflected and persistent XSS detector extension for Burp Suite. The tool was written in Python by Barak Tawily,…☆62Feb 22, 2021Updated 5 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆50Mar 5, 2026Updated 2 weeks ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- This repo contain Myanmar Pentster Community web-hacking class resources and published with education purpose.☆25Oct 20, 2024Updated last year
- A collection of Awesome Frida Scripts for MAPT☆20Jan 7, 2023Updated 3 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 5 years ago
- 🔥 Web application firewalls (WAF) bypass☆55Nov 1, 2023Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago