- Toronto
-
02:38
(UTC -05:00)
Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
Stars
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.
Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub
INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. These are the exact materials I used during my exam.
ChrisJr404 / OSCPNotes
Forked from DarthPwn/PentestNotesHere are all the notes I personally took while studying for the OSCP which helped me pass.
Source extensions for the Mihon/Tachiyomi app.
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, β¦
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Auto_Jobs_Applier_AI_Agent aims to easy job hunt process by automating the job application process. Utilizing artificial intelligence, it enables users to apply for multiple jobs in an tailored way.
Master programming by recreating your favorite technologies from scratch.
A curated list of awesome warez and piracy links
This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, tools, techniques, programming/scripting notes, and more.β¦
a list of 390+ Free TryHackMe rooms to start learning cybersecurity with THM
A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.
Code that goes along with the Hacks, Leaks, and Revelations book
A script that you can run in the background!
Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more
A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law
Python for AWAE (Advanced Web Attacks and Exploitation)
My Notes on Regular Expressions for AWAE/OSWE.