udahacker's Stars
hassnainfareed/awesome-ethical-hacking-resources
😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.
udahacker/awesome-forensics
A curated list of awesome forensic analysis tools and resources
daffainfo/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
Ignitetechnologies/BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
projectdiscovery/katana
A next-generation crawling and spidering framework.
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
alexandreborges/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
undergroundwires/Azure-in-bullet-points
☁️ Azure summary in bullet points
ruthrootz/azure-certifications-study-notes
my notes for AZ-900 and AZ-204 prep
udahacker/az-900-note
mitre/cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
mitre-attack/attack-navigator
Web app that provides basic navigation and annotation of ATT&CK matrices
mitre-attack/attack-website
MITRE ATT&CK Website
edoardottt/awesome-hacker-search-engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
udahacker/siem_solution
https://www.linkedin.com/feed/update/urn:li:activity:6985585813170356225?updateEntityUrn=urn%3Ali%3Afs_feedUpdate%3A%28V2%2Curn%3Ali%3Aactivity%3A6985585813170356225%29
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
screetsec/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
RhinoSecurityLabs/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
udahacker/infoooze
Infoooze is an Open-source intelligence (OSINT) tool in NodeJs. It provides various modules that allow efficient searches.
devXprite/infoooze
A OSINT tool which helps you to quickly find information effectively. All you need is to input and it will take take care of rest.
gtworek/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
udahacker/CISSP-Study-Guide
study material used for the 2018 CISSP exam
PacktPublishing/CompTIA-Security-SY0-501-Complete-Course-and-Practice-Exam
CompTIA Security+ (SY0-501): Complete Course and Practice Exam, published by Packt
so87/CISSP-Study-Guide
study material used for the 2018 CISSP exam
ossf/scorecard
OpenSSF Scorecard - Security health metrics for Open Source
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
pablosnt/rekono
Pentesting automation platform that combines hacking tools to complete assessments
mamun-sec/decap
edoardottt/cariddi
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Nickyie/Cybersecurity-Resources
A Library of various cybersecurity resources