Helpful mnemonics for remembing concepts you may see in the CISSP exam
☆52Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for cissp-mnemonics
Users that are interested in cissp-mnemonics are comparing it to the libraries listed below
Sorting:
- Yet another set of CISSP mnemonics☆21Oct 26, 2025Updated 4 months ago
- a mock CISSP exam test simulator using aggregated questions from online sources.☆32Jun 11, 2020Updated 5 years ago
- CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th☆76Feb 10, 2022Updated 4 years ago
- CISSP Certification Domain 1: Security and Risk Management Video Boot Camp 2019 [Video], published by Packt☆28Jan 18, 2023Updated 3 years ago
- ☆16Mar 6, 2024Updated 2 years ago
- ☆72Sep 19, 2025Updated 5 months ago
- A collaborative CISSP notes card☆39Dec 20, 2015Updated 10 years ago
- CISSP Study Materials PDF and Web Copy for 2022☆46Apr 11, 2021Updated 4 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- ☆121Jan 12, 2026Updated last month
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- On-prem GitHub Actions runners, backed by Kubernetes☆36Jan 18, 2022Updated 4 years ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- ☆11Updated this week
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Implement MTCNN with Tensorflow.js. A face detection framework with MTCNN and Tensorflow.js☆11Jun 30, 2022Updated 3 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Build & secure a Google Cloud hub-and-spoke architecture with VM-Series.☆10Oct 9, 2025Updated 4 months ago
- PoC of using Directus as ASPM☆12May 31, 2024Updated last year
- 💻🔀🗑️ Randomly declutter your computer!☆10Oct 3, 2023Updated 2 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- My GitHub profile☆55Feb 28, 2022Updated 4 years ago
- Pixano website☆10Apr 7, 2022Updated 3 years ago
- Tools and commands for managing and developing Crossplane☆14Nov 24, 2021Updated 4 years ago
- A no-code in-browser ML-Toolkit☆11Updated this week
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- TP-Framework: Testability Pattern Framework for SAST☆15May 10, 2024Updated last year
- Face2Faceの実装とか☆13Jun 11, 2016Updated 9 years ago
- ☆11Jul 19, 2023Updated 2 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- PowerShell scripts and functions aimed at CyberArk management☆12Jul 28, 2025Updated 7 months ago
- Legacy version of libewf☆13Dec 20, 2025Updated 2 months ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago