DarkCodeOrg / welcome-to-cybersecurity
this is an guide for people aspiring to enter the world of cybersecurity
☆25Updated 11 months ago
Alternatives and similar repositories for welcome-to-cybersecurity:
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below
- Projects for security students and professionals☆175Updated 8 months ago
- ☆303Updated 8 months ago
- ☆220Updated last year
- ✍️ All of the challenges I have written for CTFs☆49Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆211Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆744Updated 3 months ago
- CTF/Cyber Security learning source from beginner to neutral level☆38Updated 2 weeks ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆336Updated last year
- Penetration Testing and Offensive Security Interview Questions☆158Updated 2 years ago
- ☆139Updated last month
- Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.☆89Updated 5 years ago
- ☆209Updated 3 years ago
- Python Books for Security☆210Updated 6 years ago
- The best resources for learning exploit development☆112Updated 5 years ago
- improving...☆173Updated 2 months ago
- Don't let buffer overflows overflow your mind☆438Updated 4 years ago
- CTF101, a wiki-project documenting Capture The Flag techniques.☆198Updated last week
- This repository contains a comprehensive collection of learning resources and notes that I've gathered on various topics, including cyber…☆103Updated 2 months ago
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆200Updated 3 months ago
- Free Labs to Train Your Pentest / CTF Skills☆225Updated 2 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆49Updated 3 years ago
- Modern Reverse Engineering books and resources☆71Updated 8 months ago
- Shellshock9001 / Tjs-Nulls-OSCP-list-in-order-from-easy-medium-hard-insane-more-challenging-and-alphabeticalTj's Null list in Order with Difficulty and Alphabetical.☆27Updated 2 years ago
- Hack-the-Box-OSCP-Preparation☆797Updated 4 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆412Updated 2 years ago
- اشهر كتب الاختراق☆67Updated last year
- Learn Binary Exploitation with sample problems and solutions☆137Updated 2 years ago
- My OSCP journey☆159Updated 2 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆189Updated 2 months ago
- Notes for CEH v10 exam (source code)☆213Updated last year