santosomar / who_and_what_to_follow
Who and what to follow in the world of cyber security
☆142Updated 4 years ago
Alternatives and similar repositories for who_and_what_to_follow
Users that are interested in who_and_what_to_follow are comparing it to the libraries listed below
Sorting:
- Only the best quality InfoSec-resources shared, based on regular sourcing of publicly available content found on the internet.☆147Updated 4 years ago
- Curated list of awesome cybersecurity companies and solutions.☆157Updated 11 months ago
- ☆243Updated last year
- Primer on Information Security - ported from my blog.☆28Updated 7 years ago
- A curated list of Awesome Threat Intelligence resources☆31Updated 7 years ago
- Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.☆25Updated 5 years ago
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- Resource for developing infosec skills for OSCP☆114Updated 10 months ago
- Learn you a book for some infosec good☆63Updated 5 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- A list of collected articles and resources from the website Peerlyst☆17Updated 8 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆133Updated last week
- Penetration Testing/Security Cheatsheets☆180Updated 6 years ago
- Hands-On Penetration Testing with Python, published by Packt☆82Updated last year
- A list of web application security☆94Updated 5 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- These are my favorite places for learning various topics.☆33Updated 6 years ago
- CEHv9 - Practice Exam Questions with Answers☆68Updated 6 years ago
- USA based Information Security & I.T. Conferences☆33Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Blue Team Cheat Sheats☆161Updated 9 years ago
- Exam Prep for the Ec-council Certified Ethical Hacker 312-50☆81Updated 6 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆737Updated 3 years ago
- Violent Python scripts used in book and few other required files☆2Updated 5 years ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- ☆81Updated 5 years ago
- ☆52Updated 6 years ago
- List of web application security☆165Updated 8 years ago