Teammatriix / cybersecurity-career-pathView external linksLinks
Cybersecurity Career Path
☆12Jan 27, 2022Updated 4 years ago
Alternatives and similar repositories for cybersecurity-career-path
Users that are interested in cybersecurity-career-path are comparing it to the libraries listed below
Sorting:
- ☆44Oct 20, 2023Updated 2 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Demo content XML files for WebMan Design WordPress themes.☆17Sep 24, 2025Updated 4 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- CS3304 - Group C++ university Project creating an ATM machine software with use of encapsulation and inheritance.☆10Jun 4, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- URL Encode Injection List☆13Sep 20, 2021Updated 4 years ago
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 10 months ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- ☆10May 17, 2024Updated last year
- A Astro static typesense search demo☆10Mar 6, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- ☆16May 22, 2025Updated 8 months ago
- Generate IDN homographs and phishing domains☆12Aug 21, 2023Updated 2 years ago
- ChatGPT terminal assistant with a good memory to be used in ethical hacking, offensive cybersecurity and red teaming. **Warning:** These …☆10Mar 20, 2024Updated last year
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- ☆16Jul 24, 2019Updated 6 years ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- ☆12Mar 27, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated last year
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Jun 25, 2024Updated last year
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Phitron Django Course related code☆13Aug 29, 2023Updated 2 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆17Aug 30, 2023Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago