DarkCodeOrg / welcome-to-cybersecurityLinks
this is an guide for people aspiring to enter the world of cybersecurity
☆30Updated last year
Alternatives and similar repositories for welcome-to-cybersecurity
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below
Sorting:
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆830Updated last month
- ✍️ All of the challenges I have written for CTFs☆58Updated 3 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆436Updated last month
- CTF101, a wiki-project documenting Capture The Flag techniques.☆266Updated last month
- ☆348Updated last year
- Course materials for teaching cybersecurity in a Capture the Flag environment☆177Updated 4 years ago
- Resources for learning about Exploit Development☆411Updated 5 years ago
- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links th…☆475Updated 10 months ago
- knowledge is power☆229Updated 3 months ago
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆57Updated last month
- Things we learned from Capture The Flag hacking competitions we participated in☆21Updated 4 years ago
- Comprehensive beginner's guide to kernel development: Dive into core concepts, hands-on tutorials, and best practices. Whether you're a n…☆53Updated 2 years ago
- CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and…☆169Updated last year
- ☆145Updated 8 months ago
- Solutions (that we managed to find) for the 2021 PicoCTF☆163Updated last year
- CTF/Cyber Security learning source from beginner to neutral level☆42Updated 6 months ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Updated 2 years ago
- A curated list of awesome embedded and IoT security resources.☆2,136Updated 2 years ago
- Resources for learning about cybersecurity and CTFs☆219Updated 2 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆708Updated last year
- ☆252Updated 2 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆227Updated last year
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆670Updated 3 weeks ago
- A curated list of awesome reverse engineering resources for various topics☆577Updated last year
- Python Books for Security☆229Updated 6 years ago
- Personal Notes About Everything.☆527Updated 4 years ago
- Collection of writeups on ICS/SCADA security.☆188Updated 3 weeks ago
- ☆317Updated 8 years ago
- EthicalHacking, Python, Nmap, Metasploit☆209Updated 5 years ago
- A sorted and updated list of security wargame sites.☆1,102Updated last week