cyberguideme / CertificationsLinks
Information and Cyber Security Certifications
☆13Updated 6 years ago
Alternatives and similar repositories for Certifications
Users that are interested in Certifications are comparing it to the libraries listed below
Sorting:
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated 3 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Updated 2 years ago
- ☆24Updated 3 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆14Updated last year
- ☆21Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆54Updated 2 years ago
- ☆16Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated last year
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆61Updated 5 months ago
- Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, O…☆5Updated 2 years ago
- Source for NIST cybersecurity documents during government shutdown☆17Updated 6 years ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- FARO - Document Sensitivity Detector☆11Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- ☆10Updated last year
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- OWASP Ontology-driven Threat Modelling framework☆38Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆17Updated 4 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Wazuh - Release for Bosh.io☆11Updated last year
- ☆14Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated last week
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆40Updated last year
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆14Updated 3 years ago
- This repository supports the blog site www.cloudauditcontrols.com.☆11Updated 3 weeks ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆13Updated 8 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago