gilsontsang / Network-CCNA-David-BombalView external linksLinks
☆22Dec 27, 2019Updated 6 years ago
Alternatives and similar repositories for Network-CCNA-David-Bombal
Users that are interested in Network-CCNA-David-Bombal are comparing it to the libraries listed below
Sorting:
- Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos☆19Jul 29, 2021Updated 4 years ago
- notes while reviewing computer networking by taking online course "the bits and bytes of computer network" on Coursera from Google☆24Jun 7, 2020Updated 5 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Creating a repository for the comprehensive interview questions. This repository is open for all so happy for all to contribute in this r…☆34Apr 6, 2025Updated 10 months ago
- ☆28Dec 27, 2023Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- This project automates SOC workflows using Wazuh, Shuffle, and TheHive. It involves setting up a Windows 10 client with Sysmon and Ubuntu…☆36Jun 7, 2024Updated last year
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆38Updated this week
- Awesome Quora Topics☆33Jun 24, 2020Updated 5 years ago
- 📝 Data Structures and Algorithms in Python, with explanations!☆30Jul 3, 2022Updated 3 years ago
- ☆34May 6, 2024Updated last year
- ☆60Jun 18, 2025Updated 7 months ago
- ☆44Dec 10, 2024Updated last year
- KodeKloud Engineer solutions☆31Oct 18, 2024Updated last year
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Jul 29, 2023Updated 2 years ago
- ☆38Jan 19, 2025Updated last year
- Master Linux from beginner to advanced: commands, shell scripting, system administration, networking, security, and automation with real-…☆64Oct 24, 2025Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- Mr. Robot's EvilCorp Terminal style for your shell☆41Jun 3, 2016Updated 9 years ago
- DevOps-projects☆53Jan 14, 2023Updated 3 years ago
- ☆122Sep 30, 2022Updated 3 years ago
- Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IO…☆92Aug 4, 2025Updated 6 months ago
- Comprehensive SOC Analyst notes covering incident response, threat hunting, SOC workflows, and cybersecurity concepts—perfect for exam pr…☆107Nov 10, 2025Updated 3 months ago
- ☆69May 3, 2021Updated 4 years ago
- Interview Questions☆133Updated this week
- Hands-on cybersecurity training projects for beginners to learn vulnerability management and essential skills☆157Jun 20, 2024Updated last year
- ☆308Jan 17, 2026Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 6 months ago
- ☆170Dec 14, 2025Updated 2 months ago
- This repo contains notes and references for the CBROPS 200-201 Exam. Each directory contains a quick refernece PDF for key topics & terms…☆109Jun 16, 2021Updated 4 years ago
- Terraform-based AWS infrastructure repository featuring both modular and non-modular implementations. Covers EC2, VPC, RDS, ECS, S3, IAM,…☆97Aug 11, 2024Updated last year
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆133Jan 21, 2025Updated last year
- ☆110May 12, 2023Updated 2 years ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆594Jan 31, 2026Updated 2 weeks ago
- Build with me. DevOps projects☆142Jun 22, 2024Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Apr 10, 2024Updated last year
- ☆248Mar 29, 2025Updated 10 months ago
- Websploit is a high level MITM framework☆146Apr 22, 2022Updated 3 years ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆218Sep 25, 2025Updated 4 months ago