Resources for TCM Security Linux 101 course
☆312Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for Linux101-Resources
Users that are interested in Linux101-Resources are comparing it to the libraries listed below
Sorting:
- A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found her…☆68Jun 27, 2024Updated last year
- ☆60Feb 27, 2026Updated last week
- Labs for Practical Malware Analysis & Triage☆1,084Feb 23, 2026Updated last week
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆798Oct 23, 2020Updated 5 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,396Jun 30, 2025Updated 8 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,018Feb 12, 2023Updated 3 years ago
- Compilation of Resources from TCM's OSINT Course☆1,102May 2, 2024Updated last year
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆218Dec 28, 2022Updated 3 years ago
- Python for Defenders Course Resources☆20Aug 7, 2025Updated 7 months ago
- Practical Windows Forensics Training☆749Feb 16, 2026Updated 2 weeks ago
- Resources for Students in the Practical Webapp Security and Testing course☆169Jun 27, 2023Updated 2 years ago
- Sample pentest report provided by TCM Security☆1,332Mar 18, 2022Updated 3 years ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 7 months ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- ☆12Sep 10, 2022Updated 3 years ago
- Web recon script. No need to fear, sumrecon is here!☆397Oct 10, 2022Updated 3 years ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Oct 10, 2024Updated last year
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- A tool for parsing breached passwords☆2,093Mar 21, 2024Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- ☆432Feb 2, 2022Updated 4 years ago
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- Membuat Aplikasi Kamus Besar Bahasa Indonesia dengan Android Studio☆10Mar 23, 2021Updated 4 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 10 months ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- ☆15Apr 4, 2022Updated 3 years ago
- Burp request/response timer☆36Nov 8, 2017Updated 8 years ago
- Same Pentest Resume☆143Mar 12, 2020Updated 5 years ago
- A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.☆597Jan 2, 2023Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago