The Certified in Cybersecurity℠ (CC) is for anyone interested in gaining a basic understanding of cybersecurity concepts. This is an entry-level certification and no work experience is required.
☆26Mar 22, 2025Updated last year
Alternatives and similar repositories for ISC2-Certified-Cybersecurity-Guide
Users that are interested in ISC2-Certified-Cybersecurity-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 2 years ago
- My learning, tutorials on Cybersecurity☆116Dec 27, 2024Updated last year
- The content in this repo is based on the self-paced course called Certified in Cybersecurity from (ISC)2, which is a preparation for (ISC…☆265Oct 7, 2024Updated last year
- A comprehensive collection of study materials, practice exams, and resources that helped me successfully pass the CISSP exam.☆15Feb 7, 2025Updated last year
- A Chrome extension that allows you to summarize the content of web pages using the Cohere.ai API.☆10Jan 15, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- IS2C - CC Cybersecurity Course Notes to help you prepare for the exam☆22Sep 27, 2025Updated 6 months ago
- This project is a Customer Feedback Analysis AI Agent that do analysis, generates insights and action items based on customer feedback.☆13Oct 11, 2024Updated last year
- 🗄️ Collection and organization of information ℹ️☆19Mar 21, 2026Updated 3 weeks ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- ☆24Dec 3, 2025Updated 4 months ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Oct 21, 2024Updated last year
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- 💥 Implementation of zip bomb, using python script.☆12Dec 18, 2021Updated 4 years ago
- Some darknet resources. All content published here is for educational purposes only.☆18Mar 1, 2026Updated last month
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- some sploits☆19Sep 20, 2024Updated last year
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Practicing PostgreSQL using real questions from FAANG interviews☆12Dec 12, 2021Updated 4 years ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆12Jul 30, 2023Updated 2 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- CEHv12 Notes☆16Jun 11, 2023Updated 2 years ago
- ☆21Sep 12, 2022Updated 3 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- ISO 27001 related resources.☆23Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Web scraped Data Science Interview Questions from Towards Data Science/ Medium.com asked by FAANG/Top Product based companies in last 4-5…☆16Jan 16, 2023Updated 3 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆32Mar 31, 2026Updated 2 weeks ago
- Console app written with c# and dotnet for downloading all avalible products from Atlassian.☆25Nov 23, 2025Updated 4 months ago
- Built a deep learning model using tensorflow and keras in python for grape leaf disease detection. Used OpenCV for image processing☆15Oct 14, 2019Updated 6 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- CVE-2024-37051 poc and exploit☆29Jun 11, 2024Updated last year
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago