abathelt / Cybersecurity-coursesLinks
Cybersecurity courses I recommand
☆13Updated 3 years ago
Alternatives and similar repositories for Cybersecurity-courses
Users that are interested in Cybersecurity-courses are comparing it to the libraries listed below
Sorting:
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆45Updated 8 months ago
- Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware☆33Updated 3 months ago
- This is a repository for network security tools and technologies.☆99Updated 3 years ago
- Tools & Resources for Cyber Security Operations☆264Updated 6 months ago
- Slides for my conference talks☆45Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Updated 3 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- OSCP tools and notes☆40Updated 6 years ago
- Trace Labs - Search Party CTF Writeups☆97Updated this week
- ☆106Updated 4 years ago
- A collection of resources I'm using while working toward the OSCP☆78Updated 3 years ago
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆61Updated 4 years ago
- ☆39Updated 2 years ago
- Minimalist notes for CEH-practical Cert.☆39Updated 3 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Updated 4 years ago
- This is a Cheatsheet for eJPT.☆16Updated 4 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- Resources for Students in the Practical Webapp Security and Testing course☆21Updated last month
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆191Updated last year
- ☆16Updated 4 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- ☆29Updated 4 years ago
- Python for Defenders Course Resources☆20Updated 3 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆63Updated 3 years ago
- The entire walkthrough of all my resolved TryHackMe rooms☆71Updated 2 years ago
- Cybersecurity Notes☆166Updated last year
- ☆57Updated 3 years ago
- Penetration Testing Lab☆27Updated 11 years ago
- This is where we dump all the web 3 infromation☆39Updated 3 years ago