This repository documents my hands on experience and assignments during the Columbia University Cybersecurity Program. It includes home labs related to network security, penetration testing, and defensive security
☆13Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for Columbia-University-Cybersecurity-Program
Users that are interested in Columbia-University-Cybersecurity-Program are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 21, 2026Updated last week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆13Oct 26, 2017Updated 8 years ago
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago
- This repo is for LinkedIn Learning course: Real-Time Data Forecasting with AI and Python☆14Aug 16, 2024Updated last year
- Chrome extension that allows you to capture CSS and HTML of an element and its children.☆16Jan 7, 2013Updated 13 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Powershell repo☆17Aug 9, 2022Updated 3 years ago
- Collection of automation scripts. I hope you find it useful.☆24Sep 26, 2025Updated 7 months ago
- A simple bionic text converter that can take a file (pdf, txt, docx), extract the text, and convert it into bionic text.☆39Aug 4, 2024Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆57Oct 22, 2021Updated 4 years ago
- ☆119May 5, 2025Updated 11 months ago
- Open Source alternative for interview-coder☆52Feb 11, 2026Updated 2 months ago
- A MCP server project that creates PowerPoint presentations, forked from supercurses/powerpoint with additional features☆53Mar 27, 2025Updated last year
- CVE-2018-6066 using VBA☆67Oct 24, 2022Updated 3 years ago
- FastAPI server implementing MCP protocol Browser automation via browser-use library.☆58Oct 8, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ansible role for Debian 10 CIS hardening☆43Oct 31, 2023Updated 2 years ago
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated last year
- Learn practical Mobile and API security techniques: API Key, Static and Dynamic HMAC, Dynamic Certificate Pinning, and Mobile App Attesta…☆82Dec 6, 2024Updated last year
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆1,017Sep 7, 2025Updated 7 months ago
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆155Jul 19, 2025Updated 9 months ago
- Chart-Of-Wordlist helps to create your own custom wordlist. Also in one repository, you can find a list of awesome wordlist.☆61Mar 29, 2022Updated 4 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆151Aug 21, 2015Updated 10 years ago
- Microsoft Learn: Cloud & AI Training Content. This repository is public for Instructor Led Training purposes; we do not accept pull reque…☆82Updated this week
- A curated list of amazingly awesome Chrome extensions.☆106Apr 22, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- wifite for termux☆70Aug 23, 2018Updated 7 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- List of Open Source projects built on Browser Use☆122Aug 31, 2025Updated 7 months ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆221Mar 30, 2026Updated 3 weeks ago
- OWASP Kubernetes security and compliance tool [WIP]☆109Jun 6, 2023Updated 2 years ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆925Aug 28, 2023Updated 2 years ago
- Pentesting, made easy.☆149Mar 26, 2026Updated last month
- Windows 10 & 11 Samsung Galaxy Book Spoofer + Patched Samsung System Support Service -- Tool/guide for making *some* Samsung apps work o…☆115Nov 1, 2024Updated last year
- OpenAnt from Knostic is the leading open source LLM-based vulnerability discovery product, helping defenders proactively find verified se…☆503Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆147Apr 7, 2018Updated 8 years ago
- Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster by executing rout…☆1,531Mar 31, 2026Updated 3 weeks ago
- VoiceTypr - AI powered offline voice to text dictation tool for busy founders, vibe coders, AI power users on macos, windows. Alternative…☆366Apr 17, 2026Updated last week
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆251Apr 1, 2026Updated 3 weeks ago
- Lecture notes for a course on writing proofs, on paper and in the Lean proof assistant☆337Dec 9, 2024Updated last year
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆186Jun 23, 2024Updated last year