oxfemale / PENTESTING-BIBLELinks
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
☆240Updated 4 years ago
Alternatives and similar repositories for PENTESTING-BIBLE
Users that are interested in PENTESTING-BIBLE are comparing it to the libraries listed below
Sorting:
- It is a compilation of some resources for preparing for OSCP.☆204Updated 3 years ago
- OSCP Privilege Escalation MindMap/Guide☆195Updated 3 years ago
- ☆438Updated 2 years ago
- ☆201Updated 2 years ago
- A list of bookmarks I have used since I started my journey in cyber security☆285Updated 2 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆246Updated 2 weeks ago
- ☆209Updated 3 years ago
- ☆342Updated 2 years ago
- Automated Recon for Pentesting & Bug Bounty☆422Updated last year
- ☆228Updated 2 years ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆190Updated 2 years ago
- checklist for testing the web applications☆263Updated 2 years ago
- ☆139Updated 4 years ago
- ☆135Updated 2 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆477Updated 2 months ago
- ☆354Updated 4 years ago
- Awesome note-taking apps for hackers & pentesters !☆372Updated 4 years ago
- ☆340Updated 2 years ago
- OSCP ( Offensive Security Certified Professional )☆188Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆169Updated 3 years ago
- Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes☆228Updated 6 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆973Updated 3 years ago
- Short checklists for penetration testing methodology☆191Updated last year
- Penetration Testing and Offensive Security Interview Questions☆163Updated 3 years ago
- ☆271Updated last year
- ☆154Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Opening the door, one reverse shell at a time☆184Updated 4 years ago
- #cheat sheet for OSCP☆291Updated 5 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆451Updated 2 years ago