An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Information Security in Cybersecurity.
☆58Jan 27, 2025Updated last year
Alternatives and similar repositories for cybersecurity-infosec
Users that are interested in cybersecurity-infosec are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆43Jun 28, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated 2 years ago
- Payloads for SQLi☆19May 2, 2020Updated 5 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆22Jan 1, 2022Updated 4 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about SSL / TLS☆23Jun 24, 2024Updated last year
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Jan 6, 2024Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆18Oct 27, 2023Updated 2 years ago
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jul 5, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- A curated list of awesome awesomeness. With repository stars⭐ and forks🍴☆26Updated this week
- Will be implementing Data structures and Algorithms in some real life projects in here.☆18Jun 5, 2021Updated 4 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆228Jan 27, 2025Updated last year
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- BTECH Courses semwise☆22Jul 17, 2024Updated last year
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆30Feb 24, 2026Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jul 6, 2024Updated last year
- The definitive list of lists (of lists) curated on GitHub and elsewhere. With repository stars⭐ and forks🍴☆29Updated this week
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆24May 24, 2025Updated 9 months ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆32Dec 31, 2021Updated 4 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Mar 2, 2026Updated last week
- An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, acade…☆34Jan 23, 2022Updated 4 years ago
- An ongoing collection of awesome macOS and iOS security tools, software, libraries, learning tutorials, frameworks, academic and practica…☆34Dec 31, 2021Updated 4 years ago
- World's most Powerful and Advanced Cross Site Scripting Software☆28Jan 5, 2020Updated 6 years ago
- Check if domain has bug bounty program or not☆28Jul 28, 2023Updated 2 years ago
- ONDC Protocol (network extension layer) is the network enablement layer for ONDC. Together with the Beckn Protocol as the ONDC Protocol (…☆30Aug 21, 2024Updated last year
- Wallarm Product Documentation☆11Mar 3, 2026Updated last week
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ☆13Updated this week
- A desktop application in CSharp app with good gui that is Hospital Management System.☆10Apr 7, 2022Updated 3 years ago
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆29Dec 12, 2023Updated 2 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74May 23, 2021Updated 4 years ago
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- A low-cost automatic weather station based on the open-source Arduino platform.☆12May 3, 2024Updated last year