My learning, tutorials on Cybersecurity
☆110Dec 27, 2024Updated last year
Alternatives and similar repositories for ISC2-CC-Cybersecurity-Study-Material
Users that are interested in ISC2-CC-Cybersecurity-Study-Material are comparing it to the libraries listed below
Sorting:
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 2 years ago
- Google Cybersecurity Professional Certificate Program Coursera☆20Aug 12, 2023Updated 2 years ago
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆29Nov 26, 2025Updated 3 months ago
- Certificate Generator app useful for generating certificates from a given template.☆19May 30, 2023Updated 2 years ago
- ☆24Dec 3, 2025Updated 2 months ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Electron Frontend for the SimpleDeckyTDP Plugin☆13Sep 21, 2025Updated 5 months ago
- little kernel (lk) bootloader for Qualcomm MSM8953 devices☆13Sep 4, 2020Updated 5 years ago
- Patch your vbmeta image.☆21Feb 8, 2023Updated 3 years ago
- Comprehensive training materials for the CEH v12 exam, including detailed modules, practical exercises, hands-on labs, and best practices…☆56Mar 8, 2025Updated 11 months ago
- ☆14Jan 2, 2026Updated 2 months ago
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year
- ESP32 Marauder Portable IDE creation script☆10Oct 10, 2022Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- CISSP Books Free Download☆20Jul 27, 2024Updated last year
- Source code for Android specific modules☆10Sep 22, 2023Updated 2 years ago
- ☆22Mar 17, 2025Updated 11 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆10Feb 5, 2024Updated 2 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Redis RCE through Lua Sandbox Escape vulnerability☆10Sep 2, 2022Updated 3 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- Enhanced version of rtenv: minimal real-time environment for ARM Cortex-M3☆11May 7, 2018Updated 7 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- My personal avbroot setup for my Android devices☆21Oct 10, 2025Updated 4 months ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆12Jun 14, 2024Updated last year
- Async Web Server for ESP8266 and ESP32☆15Jul 14, 2023Updated 2 years ago
- SMI230 sensor android hal☆13Mar 20, 2025Updated 11 months ago
- Android OTA image analysis preprocessing automation tool.☆10Feb 25, 2023Updated 3 years ago
- ☆12Feb 28, 2025Updated last year
- ☆10Dec 2, 2025Updated 3 months ago
- Samples for configuring PreEmptive Protection DashO☆12Dec 31, 2024Updated last year
- ☆12Mar 22, 2024Updated last year
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆19May 12, 2024Updated last year
- qbit-matUI theme mod for LinuxServer.io's qBittorrent container☆12Jun 28, 2024Updated last year
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Generates a change log between different aosp tags. Based on the wonderful work of @alsutton☆12Dec 2, 2025Updated 3 months ago