th3cyb3rhub / resourcesLinks
Cybersecurity Resources
☆30Updated 8 months ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- Complete Roadmap for Penetration Testing☆223Updated 8 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆304Updated this week
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆12Updated last year
- my notes☆209Updated 5 months ago
- My notes while studying for the PNPT from TCM Security.☆73Updated last year
- OSCP Cheatsheet by Sai Sathvik☆70Updated last year
- 100 Hacking Tools and Resources☆108Updated last year
- 100-Days-of-Hacking☆130Updated last year
- Projects for security students and professionals☆189Updated 11 months ago
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆107Updated 2 years ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆70Updated 2 years ago
- ☆315Updated 11 months ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆199Updated last year
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆82Updated 3 months ago
- ☆410Updated 2 years ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆95Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆11Updated 11 months ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆39Updated this week
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆194Updated 5 months ago
- Your Guide to browse Onine sites☆113Updated 7 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆183Updated last year
- Automate Recon XSS Bug Bounty☆160Updated last month
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆235Updated 2 weeks ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆101Updated 3 months ago
- ☆65Updated 2 years ago
- This wil perform your full recon including some vulnerability scanning. Scriptjacker tool by Parth Narula.☆22Updated last year
- Hi everyone,☆59Updated last year
- All Solutions☆143Updated last year
- Start Bug Bounty Hunting & earn some $$$$☆35Updated last year