Схема карьерных треков в кибербезопасности
☆94Sep 7, 2025Updated 8 months ago
Alternatives and similar repositories for cybersecurity-roadmap
Users that are interested in cybersecurity-roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Репозиторий содержит список вопросов по наступальной безопасности.☆368Apr 16, 2026Updated last month
- StellaGPT is an AI voice assistant in the form of a desktop application.☆13Sep 6, 2023Updated 2 years ago
- Коллекция русских книг для изучения хакинга☆42Aug 27, 2025Updated 8 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆42Oct 30, 2024Updated last year
- ☆31Dec 27, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- reverse engineer practice☆17Oct 13, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Daemon to optimize GraphiteMergeTree automatically☆28Dec 28, 2024Updated last year
- PNG renderer for Prometheus☆28Jan 8, 2024Updated 2 years ago
- Create tables in Google BigQuery, auto-generate their schemas, and retrieve said schemas.☆10Updated this week
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Here is actual telegram bots names of project☆45May 10, 2026Updated last week
- glpi in docker-compose☆18May 16, 2024Updated 2 years ago
- ☆17Jan 7, 2026Updated 4 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Aug 25, 2015Updated 10 years ago
- ☆433May 26, 2025Updated 11 months ago
- Open Redirect Vulnerability Payload List☆11Feb 23, 2021Updated 5 years ago
- arch linux + hyprland☆82May 14, 2026Updated last week
- ☆20Sep 24, 2025Updated 7 months ago
- High performance sFlow/IPFIX/NetFlow Collector☆18Feb 8, 2024Updated 2 years ago
- Live reload for Go and other languages☆24Dec 16, 2025Updated 5 months ago
- Writeups on my TryHackMe adventures!☆57Oct 5, 2023Updated 2 years ago
- Code to aggregate tcpdump traffic and send to ELK (Elasticsearch-Logstach-Kibana)☆17Sep 9, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Russian translation of the Missing Semester of Your CS Education 📚☆33Apr 8, 2024Updated 2 years ago
- Курс "Язык программирования Python" для 1 курса ФКН ВШЭ 2023-2024 год☆33Oct 20, 2023Updated 2 years ago
- The easiest documentation framework for your Next.js app. Customizable. Open Source.☆35Jan 28, 2026Updated 3 months ago
- Лекции, семинары и лабораторные работы по курсу "Операционные системы" в МГТУ им. Н. Э. Баумана.☆33Aug 7, 2023Updated 2 years ago
- TorrServer online Installer (Windows)☆35Jan 27, 2025Updated last year
- A Chrome extension that automatically completes all Discord Quests☆99Apr 25, 2026Updated 3 weeks ago
- SSH Ncurses interface to give you a "graphic" overview of your connections☆44Nov 29, 2025Updated 5 months ago
- Contains a vagrant configuration that can be used to practise for EX294 exam☆13Oct 23, 2022Updated 3 years ago
- Fence-based CAS cache for Go with read-time validation, validated batch entries, pluggable providers/codecs and shared version state.☆64Apr 2, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My Payload Collection (XSS,SQL ...)☆14Jul 17, 2018Updated 7 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Oct 21, 2019Updated 6 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- A utility for generating and applying RouterOS / Mikrotik configuration files (.rsc) with help of Jinja2 template engine.☆33Nov 8, 2024Updated last year
- A Python-based voice assistant integrating speech-to-text (STT), text-to-speech (TTS), and powerful AI capabilities using either a local …☆18Dec 8, 2025Updated 5 months ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- 🔒 TryHackMe - Home Work ! 📝☆45Dec 19, 2024Updated last year