Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing review.
☆15Mar 3, 2024Updated 2 years ago
Alternatives and similar repositories for Roadmap-Study-Cyber-Security
Users that are interested in Roadmap-Study-Cyber-Security are comparing it to the libraries listed below
Sorting:
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆19Feb 24, 2026Updated last week
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆28Jan 22, 2024Updated 2 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Ddos с расширенными настройками. Проверка сразу несколько IP, два режима и атака на определенные порты. / Ddos with advanced settings. C…☆11Jun 7, 2020Updated 5 years ago
- Info & resources for CSC 325 Computer Architecture at TCNJ☆11Oct 1, 2020Updated 5 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- A little bit of help.☆13Jul 25, 2024Updated last year
- 通过网络资产线索(如:域名,IP地址,资产名称等),利用FOFA访问网络空间测绘数据☆11Apr 23, 2024Updated last year
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆13Mar 31, 2022Updated 3 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Dec 25, 2020Updated 5 years ago
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 21, 2026Updated last week
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- This repository contains all the solutions of assignments, starter files and other materials related to this specialization.☆10Jan 31, 2021Updated 5 years ago
- ☆10May 6, 2017Updated 8 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- 使用pyqt5开发的小学生成绩管理系统。实现:管理员登录、学生管理、成绩管理、班级管理☆11Jul 31, 2023Updated 2 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- ☆16Jun 21, 2024Updated last year
- study the kernel data structures and its API☆13May 10, 2022Updated 3 years ago
- FOAM Signal Marketplace☆12Aug 28, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- This repo stores something about reverse engineering technique fundemental☆15Jan 16, 2023Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Code Examples for the Web and Cloud Applications Security Course☆12Feb 23, 2026Updated last week
- Synchronize properties from your Obsidian notes with a Markwhen timeline file.☆12Sep 20, 2025Updated 5 months ago
- ☆11Oct 2, 2025Updated 5 months ago
- IITH BTECH CSE all Courses' Codes and Assignments☆11May 12, 2021Updated 4 years ago
- Computer architecture for teaching and research in computer systems, with IDE, editor, assembler, linker, emulator, programming examples,…☆16Updated this week
- Easy way to automate the complex task☆15Jul 15, 2022Updated 3 years ago
- Data Structures and Algorithms Explained in my own words☆15Jun 2, 2025Updated 9 months ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Galène package for YunoHost☆12Jan 23, 2026Updated last month
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Jan 30, 2023Updated 3 years ago