GS1ngh's Stars
donnemartin/system-design-primer
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
mtdvio/every-programmer-should-know
A collection of (mostly) technical things every software developer should know about
shieldfy/API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
trekhleb/learn-python
📚 Playground and cheatsheet for learning Python. Collection of Python scripts that are split by topics and contain code examples with explanations.
Kristories/awesome-guidelines
A curated list of high quality coding style conventions and standards.
HackTricks-wiki/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
perkeep/perkeep
Perkeep (née Camlistore) is your personal storage system for life: a way of storing, syncing, sharing, modelling and backing up content.
LasCC/HackTools
The all-in-one browser extension for offensive security professionals 🛠
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
0xZ0F/Z0FCourse_ReverseEngineering
Reverse engineering focusing on x64 Windows.
jassics/security-study-plan
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
vavkamil/awesome-bugbounty-tools
A curated list of various bug bounty tools
CHYbeta/Web-Security-Learning
Web-Security-Learning
jhaddix/tbhm
The Bug Hunters Methodology
evyatarmeged/Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
payloadbox/command-injection-payload-list
🎯 Command Injection Payload List
guyinatuxedo/nightmare
cujanovic/SSRF-Testing
SSRF (Server Side Request Forgery) testing resources
S3cur3Th1sSh1t/Pentest-Tools
sense-of-security/ADRecon
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
lutfumertceylan/top25-parameter
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
edoardottt/cariddi
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
go-training/training
Learning Golang one day
vasanthk/web-security-basics
Web security concepts
Zeyad-Azima/Offensive-Resources
A Huge Learning Resources with Labs For Offensive Security Players
TCM-Course-Resources/Windows-Privilege-Escalation-Resources
Compilation of Resources from TCM's Windows Priv Esc Udemy Course
johnjhacking/Buffer-Overflow-Guide
This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for TheCyberMentor's walkthrough. Please watch his walkthrough if you're confused. Feel free to implement Pull Requests or raise Issues.
evilbuffer/malware-and-exploitdev-resources
OWASP/www-project-web-security-testing-guide
The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and security professionals.
bl4de/research
Bug Bounty writeups, Vulnerability Research, Tutorials, Tips&Tricks