coma007 / SIIT-materijali
Materijali za SIIT (akreditacija 2020.), FTN NS
☆23Updated 10 months ago
Related projects: ⓘ
- ☆12Updated 2 years ago
- CTF chall write-ups, files, scripts etc (trying to be more organised LOL)☆1,615Updated last week
- ☆33Updated 3 weeks ago
- Collection of Summer 2025 tech internships!☆34,031Updated this week
- Projects for security students☆2,040Updated last week
- This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concept…☆6,047Updated last month
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆5,520Updated last month
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆539Updated last month
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,538Updated last year
- ☆16Updated this week
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug …☆18,328Updated last week
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆1,198Updated this week
- Rust Weaponization for Red Team Engagements.☆2,619Updated 4 months ago
- All About CTFs☆163Updated last year
- 🎯 Command Injection Payload List☆2,892Updated 2 months ago
- ☆2,186Updated last month
- ☆16Updated this week
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆5,443Updated last year
- ☆11Updated 2 years ago
- Organized list of my malware development resources☆1,373Updated 2 years ago
- ☆9Updated 2 years ago
- Fancy reverse and bind shell handler☆2,587Updated last month
- ☆21Updated this week
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,480Updated 3 weeks ago
- game of active directory☆5,047Updated last week
- A collection of full time roles in SWE, Quant, and PM for new grads.☆11,116Updated this week
- ☆11Updated last year
- Offensive Software Exploitation Course☆2,315Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆10,641Updated 3 weeks ago
- The ultimate WinRM shell for hacking/pentesting☆4,411Updated 2 months ago