the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine learning and cybersecurity. for more info about theis path :- https://www.sans.org/cyber-security-skills-roadmap/
☆50Nov 2, 2021Updated 4 years ago
Alternatives and similar repositories for Complete_Cybersecurity_Path
Users that are interested in Complete_Cybersecurity_Path are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A roadmap for learning cyber-security☆59Mar 4, 2021Updated 5 years ago
- All checklists☆27Mar 26, 2019Updated 7 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies☆19Jul 3, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This roadmap was built by someone who went from nothing to Principal Security Engineer in under 6 years. No college degree. No connection…☆383Nov 17, 2025Updated 4 months ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Burp Extension in Python hilighting DOM Sinks and Hosts using DOM XSS Wiki regex☆24Aug 28, 2013Updated 12 years ago
- ☆17Feb 23, 2025Updated last year
- ☆16Jan 5, 2017Updated 9 years ago
- ☆72Sep 18, 2020Updated 5 years ago
- A list for all grants in web3 domain. These grants are in different categories e.g community, development, content, etc.☆23Jul 18, 2022Updated 3 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- Cybersecurity Career Path☆2,036Mar 9, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12Jan 28, 2025Updated last year
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Web Application Security Checklist☆134Apr 10, 2025Updated last year
- Directory/Subdomain scanner developed in GoLang.☆48Dec 5, 2020Updated 5 years ago
- Gets joke from icanhazdadjoke.com, prints it☆13Jan 5, 2022Updated 4 years ago
- ☆67Jul 3, 2023Updated 2 years ago
- Smart Contracts Blockchain Project With Code and Report for Banking System. Solidity bank Dapp project☆19Aug 12, 2022Updated 3 years ago
- Solidity contracts for Aave leveraged swap☆11Feb 28, 2022Updated 4 years ago
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turbo☆10May 18, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A desktop application in CSharp app with good gui that is Hospital Management System.☆10Apr 7, 2022Updated 4 years ago
- MavLink Protocol Drone Exploiting Tool☆15Aug 24, 2024Updated last year
- 🥷 [CheatSheet] Useful wiki for Capture The Flag (CTF)☆36Jan 30, 2024Updated 2 years ago
- Cloud Native Training, Certification and Resources☆11Mar 12, 2019Updated 7 years ago
- All the complete videos of 6 courses of the specialization is available here☆33Dec 18, 2020Updated 5 years ago
- ☆16Mar 3, 2025Updated last year
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- Stablecoin leveraged reborrowing on Aave☆15May 9, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Multi-Agent AI App from Scratch in python without any depedency of framework☆15Jan 7, 2025Updated last year
- Just testing, nothing to see here.☆13Mar 17, 2022Updated 4 years ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆12Jul 30, 2023Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- An awesome list of cybersecurity educational resources☆706Jan 26, 2026Updated 2 months ago
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆389Oct 25, 2025Updated 5 months ago
- Hands On Lab☆40Nov 16, 2022Updated 3 years ago