Cybersecurity courses I recommand
☆14Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for Cybersecurity-courses
Users that are interested in Cybersecurity-courses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆46Dec 3, 2025Updated 3 months ago
- Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware☆33Dec 11, 2025Updated 3 months ago
- Sharing my BITS☆13Feb 23, 2018Updated 8 years ago
- A desktop application in CSharp app with good gui that is Hospital Management System.☆10Apr 7, 2022Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- VI-SVC model is just VITS without MAS and DurationPredictor.☆10Nov 9, 2023Updated 2 years ago
- A curated list of awesome curated lists of many topics.☆12Jan 29, 2020Updated 6 years ago
- A self-documenting, progressive discovery API protocol ideal for AI agents.☆20Feb 18, 2026Updated last month
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- Simple script to install STALKER: Shadow of Chernobyl via Wine-Appimage (no wine required)☆10Nov 10, 2023Updated 2 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- ☆24May 22, 2024Updated last year
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Advanced wireless penetration testing tools☆20Jan 19, 2022Updated 4 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- Favorite React Tools☆12Dec 15, 2023Updated 2 years ago
- A UI for Ollama on Mac☆18Jan 22, 2024Updated 2 years ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆13Mar 28, 2025Updated 11 months ago
- This health tracker demo application showcases using several Syncfusion Blazor components together in a real-world application scenario. …☆14Dec 19, 2025Updated 3 months ago
- Complete Sign up and Sign in Process for iOS SwiftUI - using Firebase Email and Password Authentication.☆12Sep 28, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Deobfuscate obfuscated python files (WIP)☆23Aug 18, 2019Updated 6 years ago
- Billing Software is a project which aims to make the process of creating a bill, setting new rates, new tax less frustrating and less str…☆14Jan 19, 2023Updated 3 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- This repository contains a collection of the most important .pkt files☆18Jul 12, 2023Updated 2 years ago
- React Test Demo☆12Dec 15, 2023Updated 2 years ago
- A self-assessment tool by @NC3-LU to help business owners implement a better cybersecurity strategy.☆25Feb 13, 2026Updated last month
- ☆13Jun 22, 2023Updated 2 years ago
- ☆10Feb 3, 2024Updated 2 years ago