x0rb3l / Cyber-BookmarksLinks
A list of bookmarks I have used since I started my journey in cyber security
☆286Updated 3 years ago
Alternatives and similar repositories for Cyber-Bookmarks
Users that are interested in Cyber-Bookmarks are comparing it to the libraries listed below
Sorting:
- ☆315Updated last year
- ☆348Updated 2 years ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆369Updated 2 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Updated 4 years ago
- #cheat sheet for OSCP☆290Updated 5 years ago
- ☆200Updated 3 years ago
- ☆748Updated 3 years ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆212Updated last year
- CSbyGB PenTips Gitbook☆113Updated last week
- ☆206Updated 3 years ago
- ☆439Updated 3 years ago
- ☆345Updated 3 years ago
- Checklists for Testing Security environment☆832Updated 7 months ago
- ☆212Updated 3 years ago
- ☆433Updated 3 years ago
- It is a compilation of some resources for preparing for OSCP.☆203Updated 3 years ago
- ☆138Updated 3 years ago
- ☆883Updated 2 years ago
- OSCP ( Offensive Security Certified Professional )☆190Updated 4 years ago
- Certification Cheatsheets☆193Updated 2 years ago
- OSCP Cheatsheet by Sai Sathvik☆76Updated 2 years ago
- ☆245Updated 3 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆704Updated 4 months ago
- ☆87Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes☆238Updated 6 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆169Updated 4 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆480Updated 5 months ago
- ☆240Updated 9 months ago