A free cybersecurity study plan to build a cybersecurity career.
☆43Mar 6, 2025Updated last year
Alternatives and similar repositories for cybersecurity-interview-university
Users that are interested in cybersecurity-interview-university are comparing it to the libraries listed below
Sorting:
- ☆22Feb 3, 2026Updated last month
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Free cybersecurity resources. Learn cybersecurity for free.☆128Jan 14, 2025Updated last year
- Kali for Penetration Testers, by EC-Council☆13Jan 10, 2023Updated 3 years ago
- ☆13Mar 7, 2025Updated last year
- ☆15Apr 10, 2025Updated 11 months ago
- ☆11Dec 7, 2025Updated 3 months ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Updated this week
- ☆13Aug 1, 2023Updated 2 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆13May 22, 2025Updated 9 months ago
- DNP3 Cyber-attack datasets☆15Mar 9, 2017Updated 9 years ago
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆19May 12, 2024Updated last year
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- A list of resources to build a information security team.☆13Feb 10, 2021Updated 5 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A tiny USB C charger for LIR2450 coin cell batteries☆16Feb 9, 2024Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Aug 11, 2021Updated 4 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- ☆16Jul 11, 2024Updated last year
- Setting up Active Directory with an Ansible Playbook and create some groups and users☆17Jun 9, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- 1500+ Template Machine/Challenges for Hack The Box (HTB) and TryHackMe (THM) for Obsidian☆27Mar 8, 2025Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- Cyber Security resource list☆18Jan 21, 2025Updated last year