paulveillard / cybersecurity-penetration-testingLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Penetration Testing in Cybersecurity.
☆82Updated 9 months ago
Alternatives and similar repositories for cybersecurity-penetration-testing
Users that are interested in cybersecurity-penetration-testing are comparing it to the libraries listed below
Sorting:
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆199Updated 6 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆19Updated 2 years ago
- 🔒 TryHackMe - Home Work ! 📝☆38Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆47Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- Minimalist notes for CEH-practical Cert.☆37Updated 3 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆35Updated 2 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴☆144Updated this week
- ☆136Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆98Updated 9 months ago
- TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.☆234Updated 8 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆46Updated 4 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆96Updated 7 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆55Updated 2 years ago
- The Complete Mobile Ethical Hacking, by EC-Council☆35Updated 4 years ago
- ☆39Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆61Updated 2 weeks ago
- this repo contains complete road map For become a Ethical Hacker For completely for free. Share this repo with your Friends.☆57Updated 7 months ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks…☆235Updated this week
- Compilation of Cyber Security Cheat Sheets☆26Updated 4 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆121Updated 3 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆32Updated 2 years ago
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆46Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆77Updated last year
- OSINT Tools for the Dark Web☆158Updated 4 months ago
- A cybersecurity resource library of knowledge documents, links to tools, and automation scripts.☆30Updated last week
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆30Updated 2 years ago