Grubbslinger / How-Cybersecurity-Really-WorksLinks

This repository is used to share the files need to complete the exercises in the book How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. NOTE: The file for Chapter 4: Malware uses some real exploit code but is rendered completely benign. This allows for more authentic alsis. Still, it may set off Endpoint Security Software and…
9Updated 4 years ago

Alternatives and similar repositories for How-Cybersecurity-Really-Works

Users that are interested in How-Cybersecurity-Really-Works are comparing it to the libraries listed below

Sorting: