Sharing our knowledge and resources in the field of cyber security.
☆22Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for Security-Resources
Users that are interested in Security-Resources are comparing it to the libraries listed below
Sorting:
- 22-23-24 Temmuz 2022 Tarihinde yapılan Siber Güvenlik Eğitimlerine Ait Dökümanlar☆31Jan 19, 2026Updated 2 months ago
- ☆79Jun 7, 2022Updated 3 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- XSS Finder Tool☆13Aug 25, 2016Updated 9 years ago
- Siber güvenlik ve daha fazlası!☆22Apr 10, 2023Updated 2 years ago
- Ab2016 Enine Boyuna Siber Güvenlik Kurs Dökümanları☆54Feb 17, 2016Updated 10 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- https://twitch.tv/mdisec☆1,171Jan 26, 2026Updated last month
- Deception implementation through analysis of BloodHound data☆55Oct 9, 2025Updated 5 months ago
- tfa is a 2fa cli tool that aims to help you to generate 2fa code on CI/CD pipelines.☆28Oct 26, 2021Updated 4 years ago
- Kali Linux Hack Tools çalışmalarım☆23Updated this week
- PHP için anlatım ve hızlı ilerleyebileceğiniz Türkçe kaynak☆30Nov 19, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Uber Go Style Guide Türkçe Çeviri☆46Oct 26, 2023Updated 2 years ago
- Telegram Gruptan Gruba User Ekleme☆13Feb 18, 2021Updated 5 years ago
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆730Jan 9, 2025Updated last year
- Sistem Yöneticileri için Linux Kuallanım Kılavuzu☆34Mar 28, 2025Updated 11 months ago
- Telegram clone ❤️☆12Aug 24, 2021Updated 4 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- Simple Phishing Application For Education :')☆14Dec 1, 2020Updated 5 years ago
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆65Jan 20, 2026Updated 2 months ago
- ☆20Mar 14, 2025Updated last year
- Görüntü işleme ile sanal ortamda çizim yapma☆13Jul 20, 2022Updated 3 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- ultimate-cybersecurity-lab☆23Mar 19, 2024Updated 2 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes☆244Jun 14, 2019Updated 6 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- ☆13Feb 12, 2024Updated 2 years ago
- Reactive webapp running on a Raspberry Pi cluster☆16May 21, 2015Updated 10 years ago
- ☆16Oct 18, 2025Updated 5 months ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- ☆27Jul 2, 2020Updated 5 years ago
- Unofficial Instagram API written in Golang☆21Feb 5, 2024Updated 2 years ago
- Bitcord - (Discord Simulation Framework)☆10Jan 30, 2022Updated 4 years ago
- ☆12Jan 21, 2019Updated 7 years ago