DarkCodeOrg / welcome-to-cybersecurity
this is an guide for people aspiring to enter the world of cybersecurity
☆22Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for welcome-to-cybersecurity
- Linux Kernel Programming, published by Packt☆828Updated 9 months ago
- This Directory contains the tutorials posted in www.embetronicx.com☆222Updated 2 years ago
- Advanced examples of Linux Device Drivers (LDD3) and detailed manual for running examples in QEMU which is patched with virtual PCI, USB,…☆419Updated last year
- Linux Kernel Programming (Part 2), published by Packt☆122Updated last month
- Linux Device Driver Development - Second Edition, published by Packt☆171Updated 8 months ago
- Solutions to Software Security course provided by University of Maryland - Coursera☆18Updated 3 years ago
- Bootlin embedded Linux and kernel training materials☆617Updated this week
- A virtual wireless device driver for Linux☆208Updated 4 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆705Updated 2 weeks ago
- Cybersecurity oriented awesome list☆1,379Updated this week
- A curated list of awesome embedded and IoT security resources.☆1,826Updated last year
- Mastering Embedded Linux Programming Third Edition, published by Packt☆589Updated last month
- Complementary Concurrency Programs for course "Linux Kernel Internals"☆367Updated 6 months ago
- Linux Device Drivers Development, published by Packt☆564Updated last year
- Design Pattern by Object-Oriented-C☆197Updated 9 years ago
- This blog also contains interview questions related to Embedded Systems, Linux BSP, Linux Kernel, ARM Architecture, C programming etc☆41Updated 5 months ago
- Linux Inter Process Communication examples☆42Updated 2 years ago
- Linux Kernel Programming 2E - published by Packt☆302Updated 3 weeks ago
- A curated list of awesome Embedded Linux resources.☆230Updated 4 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆52Updated 2 weeks ago
- ☆206Updated last year
- ☆137Updated 9 months ago
- Shellshock9001 / Tjs-Nulls-OSCP-list-in-order-from-easy-medium-hard-insane-more-challenging-and-alphabeticalTj's Null list in Order with Difficulty and Alphabetical.☆15Updated 2 years ago
- ✍️ All of the challenges I have written for CTFs☆40Updated 2 years ago
- ☆269Updated 4 months ago
- Hack-the-Box-OSCP-Preparation☆765Updated 4 years ago
- Linux Binary Exploitation☆1,304Updated 3 years ago
- C Programming Lab: Assessing Your C Programming Skills☆415Updated 3 months ago
- Repository of practice, guides, list, and scripts to help with cyber security.☆225Updated last year
- Don't let buffer overflows overflow your mind☆435Updated 4 years ago