DarkCodeOrg / welcome-to-cybersecurity
this is an guide for people aspiring to enter the world of cybersecurity
☆22Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for welcome-to-cybersecurity
- A curated list of awesome embedded and IoT security resources.☆1,816Updated last year
- Linux Kernel Programming, published by Packt☆825Updated 8 months ago
- Cybersecurity oriented awesome list☆1,356Updated this week
- ☆136Updated 9 months ago
- Linux Kernel Programming (Part 2), published by Packt☆122Updated last month
- ☆267Updated 4 months ago
- This Directory contains the tutorials posted in www.embetronicx.com☆222Updated last year
- A collection of resources for linux reverse engineering☆1,994Updated 2 years ago
- Linux Kernel Programming 2E - published by Packt☆261Updated last week
- ☆203Updated last year
- Python Books for Security☆191Updated 5 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆321Updated 10 months ago
- Solutions to Software Security course provided by University of Maryland - Coursera☆17Updated 3 years ago
- Advanced examples of Linux Device Drivers (LDD3) and detailed manual for running examples in QEMU which is patched with virtual PCI, USB,…☆418Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆694Updated this week
- Resources for learning about Exploit Development☆369Updated 4 years ago
- A Course on Intermediate Level Linux Exploitation☆986Updated 4 years ago
- ☆255Updated 7 years ago
- Solutions to the exercises in Advanced Programming in the Unix Environment v3☆46Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆751Updated 2 years ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆52Updated this week
- The Linux Programming Interface by Michael Kerrisk - Distribution Version☆288Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,129Updated 3 years ago
- Tutorials for getting started with Pwntools☆1,403Updated last month
- A curated list of awesome reverse engineering resources for various topics☆464Updated 3 months ago
- linux driver development for embedded processors 2nd edition☆162Updated last year
- Linux Device Driver Development - Second Edition, published by Packt☆171Updated 8 months ago
- Linux Binary Exploitation☆1,303Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆797Updated last year