Kwangsa19 / Ketmanto-Cybersecurity-PortfolioView external linksLinks
I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.
☆147Jul 19, 2025Updated 6 months ago
Alternatives and similar repositories for Ketmanto-Cybersecurity-Portfolio
Users that are interested in Ketmanto-Cybersecurity-Portfolio are comparing it to the libraries listed below
Sorting:
- Comprehensive cybersecurity home lab setup that integrates various technologies and configurations to enhance skills in network security,…☆25Oct 15, 2024Updated last year
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- ☆19Feb 3, 2026Updated last week
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆243Jun 3, 2024Updated last year
- Personal blog about cyber security and challenges☆18Apr 3, 2024Updated last year
- ☆24May 22, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆54Sep 10, 2024Updated last year
- this repo for cyberSecurity and ethical hacking books,projects,articles etc☆39Apr 18, 2024Updated last year
- ☆39Oct 16, 2018Updated 7 years ago
- Our team's working repository for the OpenWERX drone competition.☆31Feb 1, 2017Updated 9 years ago
- R toolbox to explore the TRON blockchain☆10Jul 18, 2021Updated 4 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆114May 17, 2022Updated 3 years ago
- Dépôt pour le jeu de rôle en ligne "Les souterrains de Delain"☆11Updated this week
- ☆42Apr 9, 2016Updated 9 years ago
- Welcome to the CEHv11 Study Material Repository! This repository contains a comprehensive collection of study materials for the Certified…☆54Mar 19, 2023Updated 2 years ago
- Fast API Endpoint!. This project examines, analyses the malware statically & dynamically using conventional strategies and also apply mac…☆10Apr 10, 2023Updated 2 years ago
- Repository containing files from all plugins projects of my WordPress plugin course (English Version)☆14May 24, 2023Updated 2 years ago
- HANA XS Advanced Python Buildpack and example multi-target-application (This Repository has been archived upon Members choice)☆10Feb 19, 2020Updated 5 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- This project contains Node.js scripts and Microsoft Excel templates for creating realistic sample fact data in SAP Analytics Cloud or oth…☆14Oct 24, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆13May 9, 2022Updated 3 years ago
- ☆11Mar 1, 2022Updated 3 years ago
- Pedagogical material on tech x business by Clement Levallois at emlyon business school☆11Jul 18, 2024Updated last year
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆161Jun 27, 2024Updated last year
- ☆58Jun 27, 2023Updated 2 years ago
- ☆46Jul 9, 2024Updated last year
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- ☆10Sep 9, 2024Updated last year
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- ☆15Apr 10, 2025Updated 10 months ago
- ☆11Jul 3, 2022Updated 3 years ago