this is an guide for people aspiring to enter the world of cybersecurity
☆33Apr 17, 2024Updated last year
Alternatives and similar repositories for welcome-to-cybersecurity
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆11Apr 3, 2017Updated 8 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- This repository is a simple and elegant business-card website for Kus Solutions☆13Oct 22, 2023Updated 2 years ago
- CEH v13 i-labs , CEH v13 Engage Answers☆33Jul 5, 2025Updated 7 months ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- P2P Communication across Network Address Translators with TCP☆13Nov 28, 2022Updated 3 years ago
- 🦌 Deep Retention, Winner @ Calhacks ✨🌠☆10Oct 26, 2024Updated last year
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Design Analysis of Algorithms notes made on 2022☆11Jul 13, 2022Updated 3 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- ☆11Feb 5, 2026Updated 3 weeks ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- Taskwarrior to LaTeX☆12Jun 22, 2013Updated 12 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- A collection of python cybersecurity projects☆47Jan 27, 2024Updated 2 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Object Detection and Tracking in Street View Imagery using YOLOv3 and DeepSORT.☆13Jun 20, 2022Updated 3 years ago
- ☆11Mar 5, 2024Updated last year
- Login and Signup form using PHP & MySQL. The code doesn't contain the elements to encrypt the password. You can enable it by using php bu…☆10Jan 27, 2019Updated 7 years ago
- My custom Archlinux with Hyprland config with Installation script☆15May 12, 2025Updated 9 months ago
- Spark Projects for the Berkeley Data Science Course☆13Aug 12, 2015Updated 10 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 6 months ago
- A maze generator written in Dart and Flutter.☆14Jun 16, 2024Updated last year
- Simple programs containing Socket Programming with C☆11May 24, 2021Updated 4 years ago
- A falling sand game written in assembly. The binary fits in 512 bytes.☆13Apr 10, 2024Updated last year
- An Android App for Indoor Navigation in College Blocks using 360-Degree Images☆15May 14, 2023Updated 2 years ago
- my beautiful page <3☆20Feb 22, 2026Updated last week
- ☆14Sep 28, 2022Updated 3 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- ☆12Apr 18, 2024Updated last year
- A Bash Script that parses through a PCAP file and automatically outputs valuable information about the Network Traffic.☆13May 28, 2024Updated last year
- ☆13Aug 2, 2020Updated 5 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year