AliceSM's Stars
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
daffainfo/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
0xSojalSec/Mobile-Application-Security
jstrosch/malware-samples
Malware samples, analysis exercises and other interesting resources.
ihebski/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
CyberSecurityUP/Awesome-Red-Team-Operations
oxsecurity/codetotal
Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code security, vulnerability, insecure infrastructure as code, and potential legal issues with open source licenses.
zakumini/OSCP-Tools
It tools for penetration Testing and OSCP Exam.
J0hnbX/RedTeam-Resources
dodo-sec/Malware-Analysis
arch3rPro/Pentest-Windows
Windows11 Penetration Suite Toolkit 一个开箱即用的windows渗透测试环境
jassics/security-study-plan
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
zer0condition/ReverseKit
x64 Dynamic Reverse Engineering Toolkit
Yaxser/Backstab
A tool to kill antimalware protected processes
GreyDGL/PentestGPT
A GPT-empowered penetration testing tool
RealityNet/iOS-Forensics-References
A curated list of iOS Forensics References, organized by folder with specific references (links to blog post, research paper, articles, and so on) for each interesting file
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
bsauce/kernel-exploit-factory
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
security-prince/Application-Security-Engineer-Interview-Questions
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Asabeneh/30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw
rizemon/exploit-writing-for-oswe
Tips on how to write exploit scripts (faster!)
xnl-h4ck3r/xnLinkFinder
A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target
InsiderPhD/hackerone-reports
Top disclosed reports from HackerOne
tanprathan/OWASP-Testing-Checklist
OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
A-poc/BlueTeam-Tools
Tools and Techniques for Blue Team / Incident Response
Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
dsasmblr/game-hacking
Tutorials, tools, and more as related to reverse engineering video games.
CyberSecurityUP/Red-Team-Management
CyberSecurityUP/Cloud-Security-Attacks
Azure and AWS Attacks
pop3ret/AWSome-Pentesting
My cheatsheet notes to pentest AWS infrastructure