Exercise files for Projectsecurity Enterprise 101 Module.
☆42Jan 9, 2025Updated last year
Alternatives and similar repositories for projectsecurity-e101
Users that are interested in projectsecurity-e101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆61Jun 18, 2025Updated 9 months ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆47Jul 8, 2019Updated 6 years ago
- deadsimple BSD Security Advisories and Announcements☆19Mar 12, 2026Updated last week
- Hands-on projects for beginners to learn and practice Active Directory monitoring using various tools.☆180Jun 21, 2024Updated last year
- Lapse (9.00-12.02) + Poops (9.00-12.52) exploit☆27Nov 25, 2025Updated 3 months ago
- This is a RAD Studio wizard / expert / plug-in which allow you to right click on an identifier in the code editor and add a breakpoint wh…☆10Sep 17, 2017Updated 8 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- Applying Mica Material to VCL forms in Delphi and C++ Builder using RAD Studio☆14Feb 27, 2022Updated 4 years ago
- UNI-2021-2025☆10Aug 7, 2024Updated last year
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆189Jun 27, 2024Updated last year
- forka ai fazeno favor vai q cai mia conta 👍☆10Aug 29, 2022Updated 3 years ago
- Python script that types out the text that exists in clipboard.☆15Mar 31, 2025Updated 11 months ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- Change background wallpaper image in Windows 11/10/8/7 and older via Win32 in Delphi.☆12Nov 10, 2021Updated 4 years ago
- Color Schemes for Konsole Terminal☆10Jun 23, 2022Updated 3 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆41Jun 10, 2025Updated 9 months ago
- YouTube music API client library based on Innertube API for Dart & Flutter☆12Sep 26, 2023Updated 2 years ago
- Complete translation (EN) of the leaked files related to Conti (chat)☆16Jan 19, 2023Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- MicroCoin official CPU and GPU miner☆13Aug 16, 2018Updated 7 years ago
- Simple Delphi REST Server☆13Dec 8, 2022Updated 3 years ago
- A Pascal compiler for the Android Dalvik Byte Code (DEX)☆15Jun 10, 2019Updated 6 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- Windows 11 Smoke Effect using Delphi and C++ Builder☆13Feb 27, 2022Updated 4 years ago
- A cloud starter kit for beginners — deploy to AWS using Terraform and GitHub Actions, no setup stress.☆17Jun 1, 2025Updated 9 months ago
- A torrent stream player.☆16Oct 8, 2023Updated 2 years ago
- Delphi, FMX. Vibration for mobiles☆15Jun 7, 2025Updated 9 months ago
- RAD Server Examples☆11Nov 26, 2025Updated 3 months ago
- Neil Bauers' Microprocessor Simulator for Students☆15Apr 26, 2014Updated 11 years ago
- Examples from PythonGUI.org☆12Oct 21, 2023Updated 2 years ago
- Samples showing Animations, Transitions and Effects in FireMonkey☆14Aug 9, 2016Updated 9 years ago
- 🍰 Freshly baked builds from HEAD.☆12Nov 6, 2024Updated last year
- ☆15Dec 15, 2016Updated 9 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆24Jun 26, 2022Updated 3 years ago
- Twitter bot detection using deep learning.☆11Dec 8, 2022Updated 3 years ago