sanchayofficial / meetups-pptLinks
You'll find all the resources and presentations I have used in my talks and workshops
☆12Updated 6 months ago
Alternatives and similar repositories for meetups-ppt
Users that are interested in meetups-ppt are comparing it to the libraries listed below
Sorting:
- A curated list of Cybersecurity ebooks (Updated 2025) topic wise for absolutely free! Start Learning today at your own pace☆10Updated last month
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆82Updated this week
- Complete Roadmap for Penetration Testing☆223Updated 8 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆129Updated 5 months ago
- ☆21Updated last month
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆33Updated this week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆137Updated 3 weeks ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 5 months ago
- My notes while studying for the PNPT from TCM Security.☆73Updated last year
- ☆83Updated this week
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 7 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆30Updated last month
- 100 Hacking Tools and Resources☆108Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆304Updated last week
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆122Updated 9 months ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆82Updated 3 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆100Updated 3 months ago
- Start Bug Bounty Hunting & earn some $$$$☆35Updated last year
- Here are some cool and some unpublished Dorks☆75Updated 4 months ago
- Collection of all the resources published by Payatu.☆10Updated last month
- Find CVEs associated to Linux and public exploits on github☆117Updated last month
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 5 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆93Updated last year
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆51Updated 2 years ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆72Updated last year
- This wil perform your full recon including some vulnerability scanning. Scriptjacker tool by Parth Narula.☆22Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 2 months ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆102Updated 3 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆183Updated last year