the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine learning and cybersecurity. for more info about theis path :- https://www.sans.org/cyber-security-skills-roadmap/
☆50Nov 2, 2021Updated 4 years ago
Alternatives and similar repositories for Complete_Cybersecurity_Path
Users that are interested in Complete_Cybersecurity_Path are comparing it to the libraries listed below
Sorting:
- A roadmap for learning cyber-security☆60Mar 4, 2021Updated 4 years ago
- All checklists☆27Mar 26, 2019Updated 6 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆135Jan 17, 2026Updated last month
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- Medichain: Secure EHR system using Hyperledger Fabric & React. Blockchain-powered health record management for privacy and data integrity…☆12Aug 18, 2023Updated 2 years ago
- ☆17Feb 23, 2025Updated last year
- MLRan: A Ransomware Behavioural Dataset for Machine Learning☆45Jun 17, 2025Updated 8 months ago
- ☆72Sep 18, 2020Updated 5 years ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- This repo about how to start in Pen-Testing Fields☆31Aug 8, 2022Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 2 months ago
- 个人翻译/总结渗透测试思维导图☆29Jun 15, 2022Updated 3 years ago
- SecureDoc leverages the power of AI and blockchain technology to create a robust system for certificate authentication. This project ensu…☆14Aug 6, 2025Updated 6 months ago
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- An awesome list of cybersecurity educational resources☆693Jan 26, 2026Updated last month
- A simple static site generator, using Markdown and Bash☆11Aug 24, 2020Updated 5 years ago
- Just your regular Qur'an apps on Android platform, except I'm trying to make it's app size as small as possible while not sacrificing any…☆15Nov 13, 2025Updated 3 months ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Example ASP.NET MVC website that handles 404 using <httpErrors> in web.config☆10Oct 14, 2015Updated 10 years ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆10Jul 30, 2023Updated 2 years ago
- ☆13Sep 28, 2024Updated last year
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Attendance Management using Smart Contract☆12Nov 21, 2020Updated 5 years ago
- My personal Blog☆10Nov 27, 2025Updated 3 months ago
- ☆11Apr 17, 2018Updated 7 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- JFrog Splunk Log Analytics Integration☆11Dec 5, 2025Updated 2 months ago
- ☆10Jul 13, 2021Updated 4 years ago
- ☆11Jun 15, 2021Updated 4 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆30Dec 19, 2025Updated 2 months ago
- ☆12Aug 12, 2016Updated 9 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 9 months ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago