Cyber Security certifications and free resources for them
☆57Sep 7, 2024Updated last year
Alternatives and similar repositories for cyber-security-roadmap
Users that are interested in cyber-security-roadmap are comparing it to the libraries listed below
Sorting:
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆44Updated this week
- Explore FREE cybersecurity courses with industry certifications from Cisco, Cybrary, and top authorities. Level up your skills for FREE! …☆38Oct 19, 2024Updated last year
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- Final year project on Animal Intrusion Detection System which is a Deep Learning based object detection project☆14Jul 5, 2023Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contracts☆35Dec 27, 2022Updated 3 years ago
- Preview : https://inseefrlab.github.io/ssphub/☆10Feb 27, 2026Updated last week
- Enigma Machine in C☆13Nov 1, 2024Updated last year
- Carbon Dioxide Removal (CDR) Modeling Experiments☆12May 29, 2025Updated 9 months ago
- A minimalist microblogging platform 🐦🔇☆10Feb 22, 2026Updated 2 weeks ago
- ☆12May 20, 2024Updated last year
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 9 months ago
- Python tool for generating undirected weighted graphs representing road networks.☆11May 26, 2024Updated last year
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 2 months ago
- Landing page frontend for Cloud services☆10Updated this week
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- In this study, we aimed to detect fraudulent activities in the supply chain through the use of neural networks. The study focused on buil…☆13Jul 29, 2024Updated last year
- the collection of all useful extensions that are used in web hacking & Bug Bounty Hunting☆13Sep 4, 2023Updated 2 years ago
- ☆10Sep 18, 2024Updated last year
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- ☆14Mar 13, 2025Updated 11 months ago
- WordPress Checklist☆12Jun 5, 2019Updated 6 years ago
- Join the GitHub Graduation Yearbook and "walk the stage" on June 11.☆13Jun 21, 2022Updated 3 years ago
- This contains a roadmap to learn basic web development☆13Jun 8, 2022Updated 3 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- "If your hate could be turned into electricity, it would light up the whole world." ― Nikola Tesla☆13Sep 30, 2020Updated 5 years ago
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated last year
- 🎟️ EventChain – Blockchain Ticketing System (PoC) A personal project exploring secure and transparent event ticketing using NFTs on the …☆17Jun 21, 2025Updated 8 months ago
- Information and Cyber Security Certifications☆14Feb 14, 2019Updated 7 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- HTML & CSS practices for web dev starters☆13Nov 25, 2022Updated 3 years ago