this is an guide for people aspiring to enter the world of cybersecurity
☆34Apr 17, 2024Updated 2 years ago
Alternatives and similar repositories for welcome-to-cybersecurity
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated last month
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Filter the Noise, Focus on What Matters in WhatsApp.☆17Apr 15, 2026Updated 2 weeks ago
- 🦌 Deep Retention, Winner @ Calhacks ✨🌠☆10Oct 26, 2024Updated last year
- A structured 90-day cybersecurity study plan for beginners (2025). Covers certifications (Network+, Security+), Linux, Python, Wireshark,…☆39Mar 8, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Web file manager application with integrated local tunnel to easily share files behind NAT or firewall.☆15Aug 1, 2018Updated 7 years ago
- CEH v13 i-labs , CEH v13 Engage Answers☆42Jul 5, 2025Updated 9 months ago
- CosLynx is an AI MVP generator by @Drix10 & @kais-radwan that revolutionizes product development. It creates custom, fully-functional MVP…☆17Nov 4, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆55Apr 10, 2026Updated 3 weeks ago
- A collection of python cybersecurity projects☆49Jan 27, 2024Updated 2 years ago
- DPDK-based UDP echo server☆13Mar 27, 2016Updated 10 years ago
- A tool to test penetration into personal systems (current version is beta)☆14Sep 10, 2022Updated 3 years ago
- Design Analysis of Algorithms notes made on 2022☆11Jul 13, 2022Updated 3 years ago
- An Android App for Indoor Navigation in College Blocks using 360-Degree Images☆15May 14, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 11 months ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆101Jan 20, 2023Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- Pure Rust implementation of 3GPP GTP (GPRS Tunneling Protocol) - GTPv1 and GTPv2☆26Dec 18, 2025Updated 4 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆15May 29, 2022Updated 3 years ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- 🦄Winner: Smart India Hackathon 2018 🌷☆15Sep 14, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- S3 bucket enumerator☆30Apr 7, 2019Updated 7 years ago
- Implemented a prototype of gNB-CU-UP a network element of 5G Radio Network. Using DPDK, a set of data-plane processing libraries and NIC …☆18Nov 27, 2021Updated 4 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- https://academy.tcm-sec.com/☆15Aug 19, 2025Updated 8 months ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Implementation of RESTful Web Services between 5G Control Plane Nodes(AMF,NRF,SMF,UDM)☆18Jul 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- LAHacks24 Google First Place Winner: AdaptED is an AI-powered interactive tutoring platform that personalizes learning through real-time …☆17Jun 22, 2024Updated last year
- A Repo to keep the CyberSecurity-IIITA projects☆17Aug 9, 2017Updated 8 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- ☆25Aug 29, 2025Updated 8 months ago
- AI tools & automation for creating short viral videos using VEO3 model☆47Jul 30, 2025Updated 9 months ago
- Cybersecurity Projects☆20Dec 18, 2022Updated 3 years ago