☆204Jan 20, 2022Updated 4 years ago
Alternatives and similar repositories for Cyber-Security-Resources
Users that are interested in Cyber-Security-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆46Oct 7, 2021Updated 4 years ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- I have collected many Free Resources. Feel free share more resources☆317Feb 1, 2023Updated 3 years ago
- ☆87Sep 27, 2022Updated 3 years ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- I collected it to help the bug hunter get a reward☆56Sep 7, 2022Updated 3 years ago
- These are my checklists which I use during my hunting.☆856Nov 30, 2023Updated 2 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- ☆631Dec 19, 2025Updated 3 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- ☆261Mar 15, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- Some contributions in the nuclei-templates repository☆62Jun 18, 2022Updated 3 years ago
- BugBounty_CheatSheet☆265May 11, 2023Updated 2 years ago
- Online Cyber Security Courses☆39Feb 25, 2019Updated 7 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,496Mar 14, 2026Updated 3 weeks ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Nov 24, 2025Updated 4 months ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- A curated list of cyber security resources that I find useful and/or entertaining. Includes: Twitter accounts, podcasts, news sources, an…☆22Jan 18, 2018Updated 8 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Small collection about free cybersecurity materials☆37Jul 25, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆10Jan 5, 2020Updated 6 years ago
- A Library of various cybersecurity resources☆2,532Feb 24, 2024Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,685Sep 8, 2023Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 4 years ago