Here's a List Of 50 Different Cybersecurity Careers
1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
๐17๐2โค1
โก๏ธ TOP 20 PHISHING TOOLS TO USE IN 2024 โก๏ธ
1. Setoolkit
โฃ https://github.com/trustedsec/social-engineer-toolkit
2. Evilginx2
โ https://github.com/kgretzky/evilginx
3. HiddenEye
โ https://github.com/DarkSecDevelopers/HiddenEye-Legacy
4. SocialFish
โฆ https://github.com/UndeadSec/SocialFish
5. SeeYou (Get Location using phishing attack)
โ https://github.com/Viralmaniar/I-See-You
6. SayCheese (Grab target's Webcam Shots)
โต https://github.com/hangetzzu/saycheese
7. QR Code Jacking
โฟ https://github.com/cryptedwolf/ohmyqr
8. ShellPhish
โธ https://github.com/An0nUD4Y/shellphish
9. BlackPhish
โค https://github.com/iinc0gnit0/BlackPhish
10. Zphisher
โง https://github.com/htr-tech/zphisher
โ 11. PhishX
โบ https://github.com/thelinuxchoice/PhishX
12. Gophish
โข https://github.com/gophish/gophish
13. Wifiphisher
โ https://github.com/wifiphisher/wifiphisher
14. Phishing Frenzy
โฏ https://github.com/pentestgeek/phishing-frenzy
15. Ghost Phisher
โ https://github.com/savio-code/ghost-phisher
16. BlackEye
โ https://github.com/thelinuxchoice/blackeye
17. King-Phisher
โถ https://github.com/rsmusllp/king-phisher
18. SpookPhish
โน https://github.com/technowlogy/spookphish
19. PyPhisher
โฅ https://github.com/KasRoudra/PyPhisher
20. HiddenPhish
โ https://github.com/HiddenPhish/HiddenPhish
1. Setoolkit
โฃ https://github.com/trustedsec/social-engineer-toolkit
2. Evilginx2
โ https://github.com/kgretzky/evilginx
3. HiddenEye
โ https://github.com/DarkSecDevelopers/HiddenEye-Legacy
4. SocialFish
โฆ https://github.com/UndeadSec/SocialFish
5. SeeYou (Get Location using phishing attack)
โ https://github.com/Viralmaniar/I-See-You
6. SayCheese (Grab target's Webcam Shots)
โต https://github.com/hangetzzu/saycheese
7. QR Code Jacking
โฟ https://github.com/cryptedwolf/ohmyqr
8. ShellPhish
โธ https://github.com/An0nUD4Y/shellphish
9. BlackPhish
โค https://github.com/iinc0gnit0/BlackPhish
10. Zphisher
โง https://github.com/htr-tech/zphisher
โ 11. PhishX
โบ https://github.com/thelinuxchoice/PhishX
12. Gophish
โข https://github.com/gophish/gophish
13. Wifiphisher
โ https://github.com/wifiphisher/wifiphisher
14. Phishing Frenzy
โฏ https://github.com/pentestgeek/phishing-frenzy
15. Ghost Phisher
โ https://github.com/savio-code/ghost-phisher
16. BlackEye
โ https://github.com/thelinuxchoice/blackeye
17. King-Phisher
โถ https://github.com/rsmusllp/king-phisher
18. SpookPhish
โน https://github.com/technowlogy/spookphish
19. PyPhisher
โฅ https://github.com/KasRoudra/PyPhisher
20. HiddenPhish
โ https://github.com/HiddenPhish/HiddenPhish
โค3๐3
Linux System Administrator Roadmap๐ง๐ป
โโโ ๐น Foundations
โ โโโ ๐ธ Basic Linux Concepts
โ โ โโโ ๐ File System Hierarchy
โ โ โโโ ๐ Permissions and Ownership
โ โ โโโ ๐ Processes and Daemons
โ โ โโโ ๐ฅ๏ธ Basic Commands (ls, cd, cp, mv, rm, etc.)
โ โโโ ๐ธ Shell and Scripting
โ โ โโโ ๐ Bash Scripting
โ โ โโโ ๐ง Basic Automation
โ โ โโโ ๐ ๏ธ Common Shell Commands (grep, awk, sed)
โ โโโ ๐ธ Networking Fundamentals
โ โ โโโ ๐ TCP/IP Stack
โ โ โโโ ๐ DNS Configuration
โ โ โโโ ๐ Network Interfaces
โ โ โโโ ๐ ๏ธ Basic Network Troubleshooting (ping, traceroute, netstat)
โ โโโ ๐ธ System Installation and Configuration
โ โโโ ๐ฟ Installation Methods (ISO, PXE)
โ โโโ ๐๏ธ Disk Partitioning and File Systems
โ โโโ ๐ Initial Configuration and Hardening
โโโ ๐น System Administration
โ โโโ ๐ธ User and Group Management
โ โ โโโ ๐ค User Accounts
โ โ โโโ ๐ฅ Group Policies
โ โ โโโ ๐ sudo Configuration
โ โโโ ๐ธ Package Management
โ โ โโโ ๐ฆ RPM and YUM (RHEL/CentOS)
โ โ โโโ ๐ฆ APT (Debian/Ubuntu)
โ โ โโโ ๐ง Compiling from Source
โ โโโ ๐ธ Process Management
โ โ โโโ ๐ Systemd and Init
โ โ โโโ ๐ Monitoring and Controlling Processes
โ โ โโโ ๐ Crontab and Scheduled Tasks
โ โโโ ๐ธ Filesystem Management
โ โ โโโ ๐๏ธ Mounting and Unmounting File Systems
โ โ โโโ ๐ NFS and Samba
โ โ โโโ ๐ Disk Quotas
โ โโโ ๐ธ Security
โ โโโ ๐ฅ Firewalls (iptables, firewalld)
โ โโโ ๐ก๏ธ SELinux and AppArmor
โ โโโ ๐ SSH Configuration and Hardening
โ โโโ ๐ Auditing and Logging
โโโ ๐น Networking and Services
โ โโโ ๐ธ Network Configuration
โ โ โโโ ๐ Static and Dynamic IP Addressing
โ โ โโโ ๐ Network Bonding and Bridging
โ โ โโโ ๐ถ VLANs
โ โโโ ๐ธ Web Services
โ โ โโโ ๐ Apache and Nginx
โ โ โโโ ๐ HTTPS and SSL/TLS
โ โ โโโ โ๏ธ Reverse Proxies
โ โ โโโ ๐ก๏ธ Web Application Firewalls (WAF)
โ โโโ ๐ธ Database Management
โ โ โโโ ๐พ MySQL/MariaDB
โ โ โโโ ๐พ PostgreSQL
โ โ โโโ ๐ NoSQL Databases (e.g., MongoDB)
โ โ โโโ ๐ Backup and Restore
โ โโโ ๐ธ Email Services
โ โ โโโ โ๏ธ Postfix and Sendmail
โ โ โโโ ๐ซ Spam Filtering
โ โโโ ๐ธ File and Print Services
โ โโโ ๐ Samba
โ โโโ ๐ NFS
โ โโโ ๐จ๏ธ CUPS
โโโ ๐น Advanced Administration
โ โโโ ๐ธ Virtualization
โ โ โโโ ๐ป KVM and QEMU
โ โ โโโ ๐ฆ VirtualBox
โ โ โโโ ๐ง Libvirt
โ โโโ ๐ธ Containerization
โ โ โโโ ๐ณ Docker
โ โ โโโ โธ๏ธ Kubernetes
โ โ โโโ ๐ง Podman
โ โโโ ๐ธ Cloud Computing
โ โ โโโ โ๏ธ AWS
โ โ โโโ โ๏ธ Azure
โ โ โโโ โ๏ธ OpenStack
โ โ โโโ โ๏ธ GCP (Google Cloud Platform)
โ โโโ ๐ธ Configuration Management
โ โ โโโ ๐ค Ansible
โ โ โโโ ๐ญ Puppet
โ โ โโโ ๐ด Chef
โ โ โโโ ๐ง SaltStack
โ โโโ ๐ธ High Availability
โ โโโ ๐ Clustering (Pacemaker, Corosync)
โ โโโ โ๏ธ Load Balancing (HAProxy, Nginx)
โ โโโ ๐ Backup and Disaster Recovery
โโโ ๐น Monitoring and Performance
โ โโโ ๐ธ System Monitoring
โ โ โโโ ๐ง Tools (Nagios, Zabbix, Prometheus, Grafana)
โ โ โโโ ๐ Log Management (ELK Stack, Graylog)
โ โโโ ๐ธ Performance Tuning
โ โ โโโ ๐ง CPU and Memory Optimization
โ โ โโโ ๐พ Disk I/O Performance
โ โ โโโ ๐ Network Performance
โ โโโ ๐ธ Troubleshooting
โ โโโ ๐ Log Analysis
โ โโโ ๐ Common Issues and Solutions
โ โโโ ๐ง Performance Bottlenecks
โ โโโ ๐ง Kernel Tuning
โโโ ๐น Scripting and Automation
โ โโโ ๐ธ Advanced Scripting
โ โ โโโ ๐ Shell Scripting (Advanced)
โ โ โโโ ๐ Python Scripting
โ โ โโโ ๐ค Task Automation
โ โโโ ๐ธ Infrastructure as Code (IaC)
โ โโโ ๐ Terraform
โ โโโ โ๏ธ CloudFormation
โ โโโ ๐ CI/CD Pipelines (Jenkins, GitLab CI)
โโโ ๐น Security and Compliance
โโโ ๐ธ Security Best Practices
โ โโโ ๐ System Hardening
โ โโโ๐ Regular Updates and Patching
โโโ ๐ Security Auditing Tools (e.g., Lynis, OpenVAS)
โโโ ๐น Foundations
โ โโโ ๐ธ Basic Linux Concepts
โ โ โโโ ๐ File System Hierarchy
โ โ โโโ ๐ Permissions and Ownership
โ โ โโโ ๐ Processes and Daemons
โ โ โโโ ๐ฅ๏ธ Basic Commands (ls, cd, cp, mv, rm, etc.)
โ โโโ ๐ธ Shell and Scripting
โ โ โโโ ๐ Bash Scripting
โ โ โโโ ๐ง Basic Automation
โ โ โโโ ๐ ๏ธ Common Shell Commands (grep, awk, sed)
โ โโโ ๐ธ Networking Fundamentals
โ โ โโโ ๐ TCP/IP Stack
โ โ โโโ ๐ DNS Configuration
โ โ โโโ ๐ Network Interfaces
โ โ โโโ ๐ ๏ธ Basic Network Troubleshooting (ping, traceroute, netstat)
โ โโโ ๐ธ System Installation and Configuration
โ โโโ ๐ฟ Installation Methods (ISO, PXE)
โ โโโ ๐๏ธ Disk Partitioning and File Systems
โ โโโ ๐ Initial Configuration and Hardening
โโโ ๐น System Administration
โ โโโ ๐ธ User and Group Management
โ โ โโโ ๐ค User Accounts
โ โ โโโ ๐ฅ Group Policies
โ โ โโโ ๐ sudo Configuration
โ โโโ ๐ธ Package Management
โ โ โโโ ๐ฆ RPM and YUM (RHEL/CentOS)
โ โ โโโ ๐ฆ APT (Debian/Ubuntu)
โ โ โโโ ๐ง Compiling from Source
โ โโโ ๐ธ Process Management
โ โ โโโ ๐ Systemd and Init
โ โ โโโ ๐ Monitoring and Controlling Processes
โ โ โโโ ๐ Crontab and Scheduled Tasks
โ โโโ ๐ธ Filesystem Management
โ โ โโโ ๐๏ธ Mounting and Unmounting File Systems
โ โ โโโ ๐ NFS and Samba
โ โ โโโ ๐ Disk Quotas
โ โโโ ๐ธ Security
โ โโโ ๐ฅ Firewalls (iptables, firewalld)
โ โโโ ๐ก๏ธ SELinux and AppArmor
โ โโโ ๐ SSH Configuration and Hardening
โ โโโ ๐ Auditing and Logging
โโโ ๐น Networking and Services
โ โโโ ๐ธ Network Configuration
โ โ โโโ ๐ Static and Dynamic IP Addressing
โ โ โโโ ๐ Network Bonding and Bridging
โ โ โโโ ๐ถ VLANs
โ โโโ ๐ธ Web Services
โ โ โโโ ๐ Apache and Nginx
โ โ โโโ ๐ HTTPS and SSL/TLS
โ โ โโโ โ๏ธ Reverse Proxies
โ โ โโโ ๐ก๏ธ Web Application Firewalls (WAF)
โ โโโ ๐ธ Database Management
โ โ โโโ ๐พ MySQL/MariaDB
โ โ โโโ ๐พ PostgreSQL
โ โ โโโ ๐ NoSQL Databases (e.g., MongoDB)
โ โ โโโ ๐ Backup and Restore
โ โโโ ๐ธ Email Services
โ โ โโโ โ๏ธ Postfix and Sendmail
โ โ โโโ ๐ซ Spam Filtering
โ โโโ ๐ธ File and Print Services
โ โโโ ๐ Samba
โ โโโ ๐ NFS
โ โโโ ๐จ๏ธ CUPS
โโโ ๐น Advanced Administration
โ โโโ ๐ธ Virtualization
โ โ โโโ ๐ป KVM and QEMU
โ โ โโโ ๐ฆ VirtualBox
โ โ โโโ ๐ง Libvirt
โ โโโ ๐ธ Containerization
โ โ โโโ ๐ณ Docker
โ โ โโโ โธ๏ธ Kubernetes
โ โ โโโ ๐ง Podman
โ โโโ ๐ธ Cloud Computing
โ โ โโโ โ๏ธ AWS
โ โ โโโ โ๏ธ Azure
โ โ โโโ โ๏ธ OpenStack
โ โ โโโ โ๏ธ GCP (Google Cloud Platform)
โ โโโ ๐ธ Configuration Management
โ โ โโโ ๐ค Ansible
โ โ โโโ ๐ญ Puppet
โ โ โโโ ๐ด Chef
โ โ โโโ ๐ง SaltStack
โ โโโ ๐ธ High Availability
โ โโโ ๐ Clustering (Pacemaker, Corosync)
โ โโโ โ๏ธ Load Balancing (HAProxy, Nginx)
โ โโโ ๐ Backup and Disaster Recovery
โโโ ๐น Monitoring and Performance
โ โโโ ๐ธ System Monitoring
โ โ โโโ ๐ง Tools (Nagios, Zabbix, Prometheus, Grafana)
โ โ โโโ ๐ Log Management (ELK Stack, Graylog)
โ โโโ ๐ธ Performance Tuning
โ โ โโโ ๐ง CPU and Memory Optimization
โ โ โโโ ๐พ Disk I/O Performance
โ โ โโโ ๐ Network Performance
โ โโโ ๐ธ Troubleshooting
โ โโโ ๐ Log Analysis
โ โโโ ๐ Common Issues and Solutions
โ โโโ ๐ง Performance Bottlenecks
โ โโโ ๐ง Kernel Tuning
โโโ ๐น Scripting and Automation
โ โโโ ๐ธ Advanced Scripting
โ โ โโโ ๐ Shell Scripting (Advanced)
โ โ โโโ ๐ Python Scripting
โ โ โโโ ๐ค Task Automation
โ โโโ ๐ธ Infrastructure as Code (IaC)
โ โโโ ๐ Terraform
โ โโโ โ๏ธ CloudFormation
โ โโโ ๐ CI/CD Pipelines (Jenkins, GitLab CI)
โโโ ๐น Security and Compliance
โโโ ๐ธ Security Best Practices
โ โโโ ๐ System Hardening
โ โโโ๐ Regular Updates and Patching
โโโ ๐ Security Auditing Tools (e.g., Lynis, OpenVAS)
๐20โค1
Bug bounty Cheatsheet๐ฌ
XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list
SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md
SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection
CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection
Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal
LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md
RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md
Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md
Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection
XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md
Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md
LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection
NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection
CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection
GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection
IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References
ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management
LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection
OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth
XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection
Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list
SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md
SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection
CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection
Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal
LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md
RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md
Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md
Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection
XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md
Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md
LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection
NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection
CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection
GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection
IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References
ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management
LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection
OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth
XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection
Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
โค2
๐ฏ All in one Awesome Cybersecurity Resources - [Part 1]
โขAwesome Red Team Ops :-
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
โขAwesome Red Teaming :-
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
โขAwesome Red Team ToolKit :-
https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
โขAwesome Blue Team Ops :-
https://github.com/fabacab/awesome-cybersecurity-blueteam
โขAwesome OSINT :-
https://github.com/jivoi/awesome-osint
โขAwesome Red Team Ops :-
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
โขAwesome Red Teaming :-
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
โขAwesome Red Team ToolKit :-
https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
โขAwesome Blue Team Ops :-
https://github.com/fabacab/awesome-cybersecurity-blueteam
โขAwesome OSINT :-
https://github.com/jivoi/awesome-osint
๐ ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ง๐ต๐ฒ๐๐ฒ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐ถ๐ป๐๐
๐๐ผ๐บ๐บ๐ฎ๐ป๐ฑ๐ ๐ณ๐ผ๐ฟ ๐ฎ ๐ฆ๐บ๐ผ๐ผ๐๐ต๐ฒ๐ฟ ๐ง๐ฒ๐ฐ๐ต ๐๐ผ๐๐ฟ๐ป๐ฒ๐! ๐
In the world of tech, knowing Linux commands can be a GAME-CHANGER. Whether youโre a Data Engineer, Developer, or Analyst, these are the commands that will save you time and make you look like a pro:
๐ ๏ธ File Management:
1๏ธโฃ ls - List files in a directory
2๏ธโฃ mkdir - Create directories
3๏ธโฃ rm - Remove files or directories
๐ป System Monitoring:
4๏ธโฃ top - Display active processes
5๏ธโฃ df -h - Check disk space usage
6๏ธโฃ free -m - Monitor RAM usage
๐ Text Processing:
7๏ธโฃ cat - View contents of a file
8๏ธโฃ grep - Search for specific text in files
9๏ธโฃ awk - Pattern scanning and text processing
๐ Permissions & Ownership:
๐ chmod - Change file permissions
1๏ธโฃ1๏ธโฃ chown - Change file ownership
๐ Networking:
1๏ธโฃ2๏ธโฃ ping - Test connectivity
1๏ธโฃ3๏ธโฃ curl - Transfer data from/to servers
๐น Pro Tip: Save time by mastering shortcuts like Ctrl+C (stop process) and Tab (autocomplete).
Join for more Linux resources: https://whatsapp.com/channel/0029Vaz9t4s2P59gEo9n7b3I
In the world of tech, knowing Linux commands can be a GAME-CHANGER. Whether youโre a Data Engineer, Developer, or Analyst, these are the commands that will save you time and make you look like a pro:
๐ ๏ธ File Management:
1๏ธโฃ ls - List files in a directory
2๏ธโฃ mkdir - Create directories
3๏ธโฃ rm - Remove files or directories
๐ป System Monitoring:
4๏ธโฃ top - Display active processes
5๏ธโฃ df -h - Check disk space usage
6๏ธโฃ free -m - Monitor RAM usage
๐ Text Processing:
7๏ธโฃ cat - View contents of a file
8๏ธโฃ grep - Search for specific text in files
9๏ธโฃ awk - Pattern scanning and text processing
๐ Permissions & Ownership:
๐ chmod - Change file permissions
1๏ธโฃ1๏ธโฃ chown - Change file ownership
๐ Networking:
1๏ธโฃ2๏ธโฃ ping - Test connectivity
1๏ธโฃ3๏ธโฃ curl - Transfer data from/to servers
๐น Pro Tip: Save time by mastering shortcuts like Ctrl+C (stop process) and Tab (autocomplete).
Join for more Linux resources: https://whatsapp.com/channel/0029Vaz9t4s2P59gEo9n7b3I
๐8โค1
Wifi password using python (1).py
561 B
Source Code To Find Wi-Fi Password Using Python๐ง ๐ฅ
๐4๐คฉ1
Here are 30 cybersecurity search engines:
1. DehashedโView leaked credentials.
2. SecurityTrailsโExtensive DNS data.
3. DorkSearchโReally fast Google dorking.
4. ExploitDBโArchive of various exploits.
5. ZoomEyeโGather information about targets.
6. PulsediveโSearch for threat intelligence.
7. GrayHatWarefareโSearch public S3 buckets.
8. PolySwarmโScan files and URLs for threats.
9. FofaโSearch for various threat intelligence.
10. LeakIXโSearch publicly indexed information.
11. DNSDumpsterโSearch for DNS records quickly.
13. FullHuntโSearch and discovery attack surfaces.
14. AlienVaultโExtensive threat intelligence feed.
12. ONYPHEโCollects cyber-threat intelligence data.
15. Grep AppโSearch across a half million git repos.
17. URL ScanโFree service to scan and analyse websites.
18. VulnersโSearch vulnerabilities in a large database.
19. WayBackMachineโView content from deleted websites.
16. ShodanโSearch for devices connected to the internet.
21. NetlasโSearch and monitor internet connected assets.
22. CRT shโSearch for certs that have been logged by CT.
20. WigleโDatabase of wireless networks, with statistics.
23. PublicWWWโMarketing and affiliate marketing research.
24. Binary EdgeโScans the internet for threat intelligence.
25. GreyNoiseโSearch for devices connected to the internet.
26. HunterโSearch for email addresses belonging to a website.
27. CensysโAssessing attack surface for internet connected devices.
28. IntelligenceXโSearch Tor, I2P, data leaks, domains, and emails.
29. Packet Storm SecurityโBrowse latest vulnerabilities and exploits.
30. SearchCodeโSearch 75 billion lines of code from 40 million projects.
โก๏ธ Give 100+ Reactions ๐
1. DehashedโView leaked credentials.
2. SecurityTrailsโExtensive DNS data.
3. DorkSearchโReally fast Google dorking.
4. ExploitDBโArchive of various exploits.
5. ZoomEyeโGather information about targets.
6. PulsediveโSearch for threat intelligence.
7. GrayHatWarefareโSearch public S3 buckets.
8. PolySwarmโScan files and URLs for threats.
9. FofaโSearch for various threat intelligence.
10. LeakIXโSearch publicly indexed information.
11. DNSDumpsterโSearch for DNS records quickly.
13. FullHuntโSearch and discovery attack surfaces.
14. AlienVaultโExtensive threat intelligence feed.
12. ONYPHEโCollects cyber-threat intelligence data.
15. Grep AppโSearch across a half million git repos.
17. URL ScanโFree service to scan and analyse websites.
18. VulnersโSearch vulnerabilities in a large database.
19. WayBackMachineโView content from deleted websites.
16. ShodanโSearch for devices connected to the internet.
21. NetlasโSearch and monitor internet connected assets.
22. CRT shโSearch for certs that have been logged by CT.
20. WigleโDatabase of wireless networks, with statistics.
23. PublicWWWโMarketing and affiliate marketing research.
24. Binary EdgeโScans the internet for threat intelligence.
25. GreyNoiseโSearch for devices connected to the internet.
26. HunterโSearch for email addresses belonging to a website.
27. CensysโAssessing attack surface for internet connected devices.
28. IntelligenceXโSearch Tor, I2P, data leaks, domains, and emails.
29. Packet Storm SecurityโBrowse latest vulnerabilities and exploits.
30. SearchCodeโSearch 75 billion lines of code from 40 million projects.
โก๏ธ Give 100+ Reactions ๐
๐19๐12โค8๐คฉ1
Become A Pro Ethical Hacker ๐ค
1. Root Me- Challenges.
2. Stok's YouTube - Videos.
3. Hacker101 Videos-Videos.
4. InsiderPhD YouTube- Videos.
5. EchoCTF -Interactive Learning.
6. Vuln Machines - Videos and Labs.
7. Try2Hack - Interactive Learning.
8. Pentester Land- Written Content.
9. Checkmarx- Interactive Learning.
10. Cybrary-Written Content and Labs.
11. RangeForce- Interactive Exercises.
12. Vuln Hub-Written Content and Labs.
13. TCM Security - Interactive Learning.
14. HackXpert-Written Content and Labs.
15. Try Hack Me- Written Content and Labs.
16. OverTheWire - Written Content and Labs.
17. Hack The Box-Written Content and Labs.
18. CyberSecLabs- Written Content and Labs.
19. Pentester Academy-Written Content and Labs.
20. Bug Bounty Reports Explained YouTube - Videos.
21. Web Security Academy- Written Content and Labs.
22. Securibee's Infosec Resources - Written Content.
Bonus: Zseano's Free Bug Bounty Methodology- Free Ebook.- Interactive Learning.
Google the above keyword
๐15๐6โค1
Here's a List Of 50 Different Cybersecurity Careers
1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
๐13
Top 28 Cyber Security Tools
1. ๐ Wireshark
2. ๐ก๏ธ Snort
3. ๐ฅ๏ธ Metasploit
4. ๐ก Nmap
5. ๐ ๏ธ Burp Suite
6. ๐ OWASP ZAP
7. ๐ Security Onion
8. ๐ Kali Linux
9. ๐ก๏ธ Suricata
10. ๐ Nessus
11. ๐ช OpenVAS
12. ๐ก๏ธ ModSecurity
13. ๐๏ธ Hashcat
14. ๐งฑ OSSEC
15. ๐ก๏ธ Fail2ban
16. ๐ค YARA
17. ๐ SELinux
18. ๐งฌ ClamAV
19. ๐ก๏ธ Security+Plus
20. ๐ GPG
21. ๐ก Aircrack-ng
22. ๐ ๏ธ Sysinternals Suite
23. ๐ฅ๏ธ Wireshark
24. ๐ KeePass
25. ๐ก๏ธ Tripwire
26. ๐ Ophcrack
27. ๐ก Netcat
28. ๐ก๏ธ Wazuh
1. ๐ Wireshark
2. ๐ก๏ธ Snort
3. ๐ฅ๏ธ Metasploit
4. ๐ก Nmap
5. ๐ ๏ธ Burp Suite
6. ๐ OWASP ZAP
7. ๐ Security Onion
8. ๐ Kali Linux
9. ๐ก๏ธ Suricata
10. ๐ Nessus
11. ๐ช OpenVAS
12. ๐ก๏ธ ModSecurity
13. ๐๏ธ Hashcat
14. ๐งฑ OSSEC
15. ๐ก๏ธ Fail2ban
16. ๐ค YARA
17. ๐ SELinux
18. ๐งฌ ClamAV
19. ๐ก๏ธ Security+Plus
20. ๐ GPG
21. ๐ก Aircrack-ng
22. ๐ ๏ธ Sysinternals Suite
23. ๐ฅ๏ธ Wireshark
24. ๐ KeePass
25. ๐ก๏ธ Tripwire
26. ๐ Ophcrack
27. ๐ก Netcat
28. ๐ก๏ธ Wazuh
โค12๐6