Skip to content

Saltinbank-SyS/Cyber-Security-Resources

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

83 Commits
 
 
 
 

Repository files navigation

Cyber-Security-Resources and courses

Open-Source Intelligence(OSINT) Fundamentals By Heath Adams

Android Pentesting Checklist

Thick client Pentesting checklist 1 | Thick client Pentesting checklist 2

Web Pentesting Checklist

Active Directory Pentesting with kali linux

TCMSecurity - Linux Privilege Escalation for Beginners

TCMSecurity - External Pentest Playbook

TCMSecurity - Practical Malware Analysis & Triage

TCMSecurity - Movement, Pivoting and Persistence

TCMSecurity - Practical Ethical Hacking - The Complete Course

TCMSecurity - Windows Privilege Escalation for Beginners

TCMSecurity - Python 101 For Hackers

TCMSecurity - Practical Phishing Assessments

TCMSecurity - Mobile Application Penetration Testing

OSWE

Red Team Courses

Maltego Advanced Course

Reverse Engineering and Exploit Development

CPENT - The Certified Penetration Testing Professional

Introduction to Exploit/Zero-Day Discovery and Development

Advanced Web Attacks and Exploitation (AWAE/WEB-300) -

Web Hacking Secrets How to Hack Legally and Earn Thousands of Dollars at HackerOne

Complete Cyber Range Hacking Lab Full Course

HOW HACKERS CREATE UNDETECTABLE MALWARE AND VIRUSES PAID COURSES LEAKED

Black Hat Hacking Course

Zsecurity all courses

PACKT - The Complete Ethical Hacking Course

Extreme hack pack

God Pack Cyber security Collections courses

Penetration Testing Course with Kali Linux (PWK) 2020 v2

Black hat series | Part 1 | Part 2 | Part 3

Read Team Courses

SQL Injection From Zero to Hero

Best Collections of Cyber Security Courses

Ethical hacking & Cyber security complete package course

OSCP

OSWP

OSEP

Best Cracking Course

Paid Carding courses

Bug Bounty Mind map

NjRAT v0.7d Danger Edition - Hack Anyone PC Silently

Hacking Web Applications via PDFs, Images, and Links

HOW HACKERS CREATE UNDETECTABLE MALWARE AND VIRUSES PAID COURSES LEAKED

Mega Hacking Pack

All Cyber security courses

Offensive security course

BUNDLES IN PYTHON & CYBER SECURITY | MASSIVE EBOOKS COLLECTION [14.07 GB]

[https://mega.nz/folder/e58i0IJI#24XkzwcuKPrjUnFUYw8n0Q/folder/ih9XAKJI](CompTIA Security+ (SY0-501 & SY0-601) Complete Course & Exam)

Codered blackhat python course

Python for ethical hacking

CHFI - Computer Hacking Forensic Investigator || 2021 Updated Course | Link 1 | Link 2

Windows 11 ISO

Cyber Security Collection | Link 1 | Link 2 | Link 3

All collection of Cyber Security Courses

Technical navigator ethical hacking course

CRYPTOKNIGHT - Beginner to Pro in Ethical Hacking

Spamming course by Dedsec

Dedsec Complete Course

150 GB of Udemy - Ethical Hacking Courses

🔰HACKSTARS – Ethical Hacking & Cyber Security Course Part 1🔰

🔥 Team_Hack Hacking Tutorials 🔥

Bugbounty cheatsheet

BLACKHAT & WHITEHAT MONEY METHODS

BUNDLES IN PYTHON & CYBER SECURITY | MASSIVE EBOOKS COLLECTION

EC Council | Certified Security Analyst

CEH V6 CEH V7&8 CehV9 CEHV10 CEH V11

Hackpack 2021 With New And Updated Methods & tutorial 🔰 | Decrypt key : rQY3SploFUHCyr74L3X4jQ

Complete Ethical hacking bootcamp 2021 zero to mastery

The Complete Cybersecurity Bootcamp: Threat Defense, Ethical Hacking, and Incident Handling | Decrypt Key: thdrksdhckr

CHFI - Computer Hacking Forensic Investigator - EC-COUNCIL | Decrypt Key: thdrksdhckr

Cyber security course 1 | Cyber security course 2 | Cyber security course 3

If you are looking for any cyber security course for free then search in this website => Link

How to attack open server

CISA, CISSP training videos

Offensive software exploition

Udemy hacking course

Learn how a hacker hacks into the system and learn how to secure them from getting hacked.

Blackhat Cracking Course by technical navigator

NPTEL Ethical hacking program

Binary Exploits with python

🔰INE - OSCP Security Technology Course🔰

CEH v10 Module

CEH version 11

​​​CEH v11 EC - Council Certified Ethical Hacking All Module Pdfs By Shuklaji VSICS

🔰CompTIA CySA+ (CS0-002) Complete Course & Practice Exam🔰

Comptia Security + Full Course

CompTIA Security + SY0-601 Complete Video Course

🔰 CISM Course 🔰

🔰CompTIA CySA+ (CS0-001) Complete Course & Practice Exam🔰

Privilage escalation cheet sheet

The Complete Privilage esclation course

ETHICAL HACKING WITH GO PROGRAMMING LANGUAGE: BUILD TOOLS

Ethical Hacking materials

Kali linux and ethical hacking courses

Android Hacking Course Free🔰

The Complete Mobile Ethical Hacking Course

Mobile Application Security and Penetration Testing

🔰Udemy – Mobile Application Hacking and Penetration Testing (Android)

🎩 eLearnSecurity – Mobile Application Security and Penetration Testing (MASPT v2) 🎩

Mobile Hacking course

Attify's (Pentester Academy) Android Pentesting Course

Mobile Security: Reverse Engineer Android Apps From Scratch

Zsecurity All courses

🔰kaspersky malware analysis Lab 🔰 | Decrypt key: _PwXA4xcKRzK5hKwDq7eeA

🔰Fireeye Malware analysis Crash course🔰 | Decrypt Key: z54sl7M7_a4m44YpV8ThBQ

Lynda Cybersecurity course 1| Lynda Cybersecurity course 2| Lynda Cybersecurity course 3

Intro to Bug Bounty Hunting and Web Application Hacking by Ben Sadeghipour AKA nahamsec | Decrypt key: thdrksdhckr

Bug Bounty: Hacking WebApps from Scratch

Cyber Security Web Application Defender

Ethical Hacking penetration testing & Bug Hunting

Ethical Hacking penetration testing & Bug Hunting-v2

Ethical Hacking penetration testing & Bug Hunting-v2

Ethical Hacking penetration testing & Nmap

Website hacking by Zsecurity

Android Mobile Hacking Workshop

Android Mobile Hacking course

Mobile Hacking course

OS prashant Android hacking course

Pentester Academy All Courses | link 1 | link 2 | link 3 | Link 4

Elearn Security Courses| link 1 | link 2 | link 3

Certified Security Analyst Training (CSAT)

All Azure Certification Courses

Security Courses

Master in Hacking with XSS Cross Site Scriptin

Exploit Development for Linux (x86)

Pearson IT CCNP Security Cisco Identify

Advance Penetration Testing Link 2

Lynda Android Malware Analysis

Software Ethical Hacking - How to Crack Software Legally

🔰Reverse Engineering Ransomware

Security Courses

🎭Jigsaw Ransomware 🎭Atom/Shark Ransomware

All About DDoS Attacks: Become a DDoS Guru!

Security career

SIEM Solutions

Cracking Packs

Security Books

Python Books

PMP

Programming Books

Udemy paid courses Link 1 link 2

Crypto Currency Course

ALL Type Of Campus Placements Resources

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published