DarkCodeOrg / welcome-to-cybersecurityLinks
this is an guide for people aspiring to enter the world of cybersecurity
☆30Updated last year
Alternatives and similar repositories for welcome-to-cybersecurity
Users that are interested in welcome-to-cybersecurity are comparing it to the libraries listed below
Sorting:
- ✍️ All of the challenges I have written for CTFs☆57Updated 3 years ago
- CTF101, a wiki-project documenting Capture The Flag techniques.☆246Updated last month
- ☆144Updated 7 months ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆816Updated 9 months ago
- Course materials for teaching cybersecurity in a Capture the Flag environment☆176Updated 4 years ago
- ☆335Updated last year
- A curated list of awesome embedded and IoT security resources.☆2,101Updated last year
- Resources for learning about Exploit Development☆404Updated 4 years ago
- knowledge is power☆227Updated last month
- Python Books for Security☆225Updated 6 years ago
- Resources for learning about cybersecurity and CTFs☆217Updated 2 years ago
- ☆41Updated 2 weeks ago
- CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and…☆166Updated last year
- Materials from the CS Level-Up trainers☆11Updated last month
- Practice your hacking skills with these CTFs☆294Updated last year
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆641Updated 10 months ago
- Activities by RE:UN10N members☆17Updated last week
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆225Updated last year
- ☆249Updated 2 years ago
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆734Updated 6 months ago
- This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links th…☆466Updated 8 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆432Updated 3 years ago
- Linux Kernel Programming, published by Packt☆898Updated last year
- A sorted and updated list of security wargame sites.☆1,076Updated 2 weeks ago
- EthicalHacking, Python, Nmap, Metasploit☆177Updated 4 years ago
- A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serve…☆586Updated 2 months ago
- This contains all CTF challenges from old BYU-only CTFs.☆16Updated last year
- This holds lesson plans, exercises, tools, scripts, links, etc. used in CTF training meetings☆55Updated this week
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆121Updated 3 weeks ago
- Linux Binary Exploitation☆1,343Updated 4 years ago