this is an guide for people aspiring to enter the world of cybersecurity
☆34Apr 17, 2024Updated 2 years ago
Alternatives and similar repositories for welcome-to-cybersecurity
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Updated this week
- Template python3 project with instructions for development in VSCode☆14Jul 21, 2023Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Filter the Noise, Focus on What Matters in WhatsApp.☆17Apr 15, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 3 years ago
- A python tool to dissect various BLE GATT packets for replay and analysis.☆13Dec 29, 2019Updated 6 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- Web file manager application with integrated local tunnel to easily share files behind NAT or firewall.☆15Aug 1, 2018Updated 7 years ago
- simple network signature/rule intrusion detection system written in Python.☆15Jun 10, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆55Apr 10, 2026Updated last month
- A collection of python cybersecurity projects☆49Jan 27, 2024Updated 2 years ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆21May 26, 2025Updated 11 months ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆12Jun 25, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆102Jan 20, 2023Updated 3 years ago
- 🚩 A cheatsheet of useful tools and shell scripts that come in handy in capture the flag contests.☆47Feb 2, 2018Updated 8 years ago
- [PT-BR] Discover the comprehensive 'JIC - Jornada de Iniciação Científica - Guia de estudos para Web Hacking', an enlightening resource f…☆38Oct 18, 2021Updated 4 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆16May 29, 2022Updated 3 years ago
- ☆22Mar 18, 2024Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- Projects based on The Frontend Developer Career Path curriculum.☆17Jul 22, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- https://academy.tcm-sec.com/☆15May 10, 2026Updated last week
- List of RegEx DoS (ReDoS) CVEs and resources☆30Feb 6, 2023Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- ☆19Apr 28, 2025Updated last year
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- my beautiful page <3☆19Apr 16, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 🏅 TalkTuahBank — Overall 1st Place @ HackUTD 2024 & Goldman Sachs Winner | AI-powered, voice-based banking assistant accessible via any …☆18May 10, 2026Updated last week
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- A Repo to keep the CyberSecurity-IIITA projects☆17Aug 9, 2017Updated 8 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- ☆25Aug 29, 2025Updated 8 months ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 4 years ago