☆68Jul 3, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Security-Roadmap-from-0
Users that are interested in Cyber-Security-Roadmap-from-0 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆732Sep 24, 2024Updated last year
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆130Sep 22, 2022Updated 3 years ago
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆28Mar 25, 2024Updated 2 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- A roadmap for learning cyber-security☆59Mar 4, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆214Nov 27, 2023Updated 2 years ago
- ☆14Sep 6, 2023Updated 2 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆12Mar 9, 2026Updated 3 weeks ago
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- This repo contains all the code needed to run the Cognito Vue workshop☆14Jul 16, 2021Updated 4 years ago
- A simple 3d chess game☆23May 15, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆16Mar 3, 2024Updated 2 years ago
- A coding assistant written in Python.☆12Oct 9, 2024Updated last year
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆75Jan 3, 2026Updated 2 months ago
- Teknofest Savaşan İHA Yarışması için geliştirilen Görüntü İşleme Görev Yazılımı☆21Jan 30, 2023Updated 3 years ago
- ☆29Aug 14, 2025Updated 7 months ago
- The internship report highlights the major works carried out by the author in terms of academic and non-academic perspectives. The scope …☆19May 10, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆73Dec 19, 2022Updated 3 years ago
- ☆15Aug 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A curated list of cyber security resources and tools.☆483Updated this week
- Detailed Roadmap of all technologies from scratch.☆36Mar 22, 2024Updated 2 years ago
- R toolbox to explore the TRON blockchain☆10Jul 18, 2021Updated 4 years ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆95Nov 2, 2023Updated 2 years ago
- Minimal Ethereum DAO using scaffold-eth and Tailwind CSS☆12Jul 11, 2022Updated 3 years ago
- ☆20May 22, 2021Updated 4 years ago
- Stablecoin leveraged reborrowing on Aave☆14May 9, 2022Updated 3 years ago
- The Absolute Beginners Guide to Cyber Security 2025 - Part 1, by Packt Publishing☆21Mar 19, 2025Updated last year
- Simple node.js linux only keylogger using events☆59Apr 5, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Docker container and run scripts for MIT's xv6 kernel. Useful for USC CSCI 350.☆32Jan 24, 2024Updated 2 years ago
- Teknofest 2021 Savaşan İha yarışması api sistemi☆22Mar 10, 2023Updated 3 years ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆171Feb 22, 2026Updated last month
- Niwder: Download, upload, and go wild with Mega, Google Drive and direct download links.☆12Oct 30, 2022Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,831Feb 13, 2026Updated last month
- Library Management System using HTML, CSS, JavaScript and Firebase.☆24May 17, 2019Updated 6 years ago