A free cybersecurity study plan to build a cybersecurity career.
β44Mar 6, 2025Updated last year
Alternatives and similar repositories for cybersecurity-interview-university
Users that are interested in cybersecurity-interview-university are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π§ [Research] E-Mail Injection: Vulnerable applicationsβ17May 26, 2024Updated last year
- Painless to setup lightweight log aggregation systemβ14Feb 19, 2024Updated 2 years ago
- Kali Linux Tutorial For Beginners, published by Packtβ28Mar 5, 2023Updated 3 years ago
- ultimate-cybersecurity-labβ24Mar 19, 2024Updated 2 years ago
- π¨ Quick tool to finds and extract email addresses from a body of textβ12Apr 15, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Parses nessus vulnerability scan data to streamline CVE POC lookupsβ14Mar 13, 2025Updated last year
- 1500+ Template Machine/Challenges for Hack The Box (HTB) and TryHackMe (THM) for Obsidianβ28Mar 8, 2025Updated last year
- β22Feb 3, 2026Updated last month
- A tiny USB C charger for LIR2450 coin cell batteriesβ16Feb 9, 2024Updated 2 years ago
- β16Dec 28, 2024Updated last year
- Free cybersecurity resources. Learn cybersecurity for free.β130Jan 14, 2025Updated last year
- S4vitar's desktop enviroment automaticβ12Feb 9, 2023Updated 3 years ago
- β11May 24, 2024Updated last year
- Yet another machine learning-based WAF researchβ26Jun 21, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Trivia / quiz bot for discord, written in pythonβ10May 17, 2017Updated 8 years ago
- Burp Suite Extensionsβ12Oct 19, 2021Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and researchβ12Jun 10, 2017Updated 8 years ago
- The tutorial of "Kubernetes Security for Microservices"β14Oct 3, 2023Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Planβ17Sep 4, 2021Updated 4 years ago
- π΅οΈββοΈ ML project to identify malicious web payloads, aimed at boosting the effectiveness of WAFs and IDSs.β15Apr 7, 2024Updated last year
- Penetration Testing & Red Team tools & scriptsβ12Sep 22, 2023Updated 2 years ago
- Scripts I have made for blue teamβ16Apr 1, 2018Updated 7 years ago
- CompTIA Security+ SY0-701 Notes & CheatSheet β Complete Study Guide, Exam Prep, and Practice for Cybersecurity Certificationβ137Aug 8, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Best wallet smart contract for TON Blockchain and other TVM-based blockchainsβ29Oct 27, 2025Updated 5 months ago
- Repo of RIT CCDC Team Scriptsβ14Mar 28, 2022Updated 4 years ago
- My journey and notes on learning Offensive Security from the ground upβ21Dec 22, 2025Updated 3 months ago
- Useful resources about phishing email analysisβ86Jan 31, 2025Updated last year
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository isβ¦β26May 18, 2025Updated 10 months ago
- π‘οΈ Master the essentials of SOC/Security Analysis with our 12-day SOC Analyst Prerequisites Learning Path, covering Linux, Windows, netwβ¦β24Oct 12, 2024Updated last year
- β41Jul 20, 2024Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.ioβ¦β25Mar 31, 2022Updated 3 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activβ¦β16Jun 25, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create a SOC lab with SIEM, AD, Workstation, Firewall, Sysmon, IPS. Step by Stepβ30Nov 27, 2022Updated 3 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into yβ¦β12Mar 9, 2026Updated 3 weeks ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.β16Jul 10, 2021Updated 4 years ago
- Challenge archiveβ25Mar 7, 2026Updated 3 weeks ago
- The Complete Mobile Ethical Hacking, by EC-Councilβ38Dec 23, 2020Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β15Aug 16, 2022Updated 3 years ago
- β13Aug 1, 2023Updated 2 years ago