I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.
☆150Jul 19, 2025Updated 7 months ago
Alternatives and similar repositories for Ketmanto-Cybersecurity-Portfolio
Users that are interested in Ketmanto-Cybersecurity-Portfolio are comparing it to the libraries listed below
Sorting:
- Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate☆140Oct 3, 2023Updated 2 years ago
- 🐝Bee: The fastest way to share files on your LAN.☆30Feb 8, 2026Updated last month
- Comprehensive cybersecurity home lab setup that integrates various technologies and configurations to enhance skills in network security,…☆26Oct 15, 2024Updated last year
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆23Sep 23, 2024Updated last year
- ☆22Feb 3, 2026Updated last month
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated 2 weeks ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆246Jun 3, 2024Updated last year
- Personal blog about cyber security and challenges☆19Apr 3, 2024Updated last year
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- ☆24May 22, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆56Sep 10, 2024Updated last year
- this repo for cyberSecurity and ethical hacking books,projects,articles etc☆41Apr 18, 2024Updated last year
- ☆39Oct 16, 2018Updated 7 years ago
- A list of cybersecurity projects that use machine learning techniques☆69Nov 9, 2016Updated 9 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- (Work in progress) React documentation website in Tamil☆16Mar 2, 2026Updated last week
- R toolbox to explore the TRON blockchain☆10Jul 18, 2021Updated 4 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆120May 17, 2022Updated 3 years ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- Welcome to the CEHv11 Study Material Repository! This repository contains a comprehensive collection of study materials for the Certified…☆54Mar 19, 2023Updated 2 years ago
- ☆44Apr 9, 2016Updated 9 years ago
- HANA XS Advanced Python Buildpack and example multi-target-application (This Repository has been archived upon Members choice)☆10Feb 19, 2020Updated 6 years ago
- This project contains Node.js scripts and Microsoft Excel templates for creating realistic sample fact data in SAP Analytics Cloud or oth…☆14Oct 24, 2024Updated last year
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- This is a Cross Project for dev-Common structures, listing all final ontoliogy structures of any common good application☆14Aug 23, 2017Updated 8 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆11Jun 24, 2023Updated 2 years ago
- Creating a remote keylogger in Python and disguising the executable as a JPEG.☆13Aug 30, 2023Updated 2 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- Repository containing files from all plugins projects of my WordPress plugin course (English Version)☆14May 24, 2023Updated 2 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- ☆13May 9, 2022Updated 3 years ago
- Pedagogical material on tech x business by Clement Levallois at emlyon business school☆11Jul 18, 2024Updated last year
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆181Jun 27, 2024Updated last year
- ☆58Jun 27, 2023Updated 2 years ago