this is an guide for people aspiring to enter the world of cybersecurity
☆34Apr 17, 2024Updated last year
Alternatives and similar repositories for welcome-to-cybersecurity
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below
Sorting:
- PYMI team CTF write-up☆10Mar 26, 2023Updated 2 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 weeks ago
- Hexagon kernel (Hexagonix kernel)☆13Jan 21, 2026Updated 2 months ago
- Solution for cryptohack challenges☆21Oct 6, 2021Updated 4 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆17Oct 25, 2021Updated 4 years ago
- Spark Projects for the Berkeley Data Science Course☆13Aug 12, 2015Updated 10 years ago
- A structured 90-day cybersecurity study plan for beginners (2025). Covers certifications (Network+, Security+), Linux, Python, Wireshark,…☆33Mar 8, 2025Updated last year
- CEH v13 i-labs , CEH v13 Engage Answers☆34Jul 5, 2025Updated 8 months ago
- A collection of config files for linux focusing on hackthebox theme☆53Oct 10, 2025Updated 5 months ago
- A collection of python cybersecurity projects☆47Jan 27, 2024Updated 2 years ago
- A tool to test penetration into personal systems (current version is beta)☆14Sep 10, 2022Updated 3 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆99Jan 20, 2023Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆22Mar 18, 2024Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 7 months ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Welcome to Gamertown, the behind the counter tool used to make dreams come true.☆33Sep 12, 2024Updated last year
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- LAHacks24 Google First Place Winner: AdaptED is an AI-powered interactive tutoring platform that personalizes learning through real-time …☆17Jun 22, 2024Updated last year
- my beautiful page <3☆20Feb 22, 2026Updated last month
- 🏅 TalkTuahBank — Overall 1st Place @ HackUTD 2024 & Goldman Sachs Winner | AI-powered, voice-based banking assistant accessible via any …☆18Nov 26, 2024Updated last year
- A Repo to keep the CyberSecurity-IIITA projects☆17Aug 9, 2017Updated 8 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A comprehensive list of competition winners in Machine Learning, Deep Learning, etc.☆21Jul 13, 2019Updated 6 years ago
- P2P Crowd Sourced Insurance For Missed Flights | Proffer Blockchain Hackathon Winner☆22Nov 13, 2017Updated 8 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago