Grubbslinger / How-Cybersecurity-Really-WorksLinks
This repository is used to share the files need to complete the exercises in the book How Cybersecurity Really Works: A Hands-On Guide for Total Beginners. NOTE: The file for Chapter 4: Malware uses some real exploit code but is rendered completely benign. This allows for more authentic alsis. Still, it may set off Endpoint Security Software and…
☆9Updated 4 years ago
Alternatives and similar repositories for How-Cybersecurity-Really-Works
Users that are interested in How-Cybersecurity-Really-Works are comparing it to the libraries listed below
Sorting:
- Interactive version of the Security Certification Roadmap found at https://pauljerimy.com/security-certification-roadmap/☆108Updated 4 months ago
- A set of guidelines and best practices for an awesome engineering team☆243Updated last month
- OWASP Foundation Web Respository☆88Updated 4 months ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆73Updated 8 months ago
- Cybersecurity Architects Handbook, published by Packt☆24Updated last year
- Mastering Python for Networking and Security, Second Edition, published by Packt☆153Updated 2 years ago
- Official list of .gov domains☆265Updated this week
- Site for NSA's Open Source project listing☆293Updated 2 weeks ago
- This repo contains the source for the CVE Services API.☆207Updated last week
- A collection of learning resources for budding aviation security researchers☆94Updated 4 years ago
- Jupyter notebooks helping open source researchers, journalists, and fact-checkers use command line tools and code projects for digital in…☆257Updated last month
- Script repository for the book Cybersecurity Ops with bash☆172Updated 5 years ago
- ✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberr…☆215Updated last year
- SkillTree is a micro-learning gamification platform supporting the rapid integration of a gamified tool training approach into new and ex…☆494Updated this week
- This will be a wiki when it grows up, if it grows up☆93Updated last year
- Public home for NIST open source software catalog☆19Updated 3 months ago
- Hak5 WiFi Coconut Userspace☆129Updated last year
- ☆16Updated 2 years ago
- This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is a…☆191Updated 11 months ago
- 🧾 Collection of resources to study for CompTia Pentest+ exam (PT0-002).☆29Updated 4 years ago
- Code that goes along with the Hacks, Leaks, and Revelations book☆166Updated last week
- OWASP Foundation Web Respository☆146Updated 2 months ago
- ☆46Updated 7 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆140Updated last year
- Guidance for blocking outdated web technologies. #nsacyber☆60Updated 3 years ago
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆50Updated 4 years ago
- Learn Ethical Hacking from Scratch, published by Packt Publishing☆92Updated 2 years ago
- This repo contains all of the scripts used in Practical Vulnerability Management (No Starch Press, 2020)☆38Updated 3 years ago
- The current repository contains all the scripts needed to reproduce the results published in the paper: "Obfuscation Revealed: Electromag…☆75Updated 3 years ago
- OWASP Foundation Web Respository☆80Updated last month