☆66Jul 3, 2023Updated 2 years ago
Alternatives and similar repositories for Cyber-Security-Roadmap-from-0
Users that are interested in Cyber-Security-Roadmap-from-0 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security re…☆391Oct 25, 2025Updated 6 months ago
- ☆732Sep 24, 2024Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 5 years ago
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆130Sep 22, 2022Updated 3 years ago
- OWASP WSTG Türkçe Rehber☆16Apr 9, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆28Mar 25, 2024Updated 2 years ago
- A roadmap for learning cyber-security☆59Mar 4, 2021Updated 5 years ago
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆214Nov 27, 2023Updated 2 years ago
- ITI DB - SQL Labs☆24May 25, 2025Updated 11 months ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- Solving Sudoku Puzzles With Computer Vision And Neural Networks☆10Jan 17, 2021Updated 5 years ago
- ☆881Nov 4, 2024Updated last year
- HackingNotes☆19Nov 1, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆19Apr 8, 2026Updated last month
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- ☆12Sep 14, 2022Updated 3 years ago
- This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting …☆15Feb 17, 2023Updated 3 years ago
- A simple 3d chess game☆23May 15, 2024Updated last year
- Quantum Insert Backdoor POC☆12May 21, 2017Updated 8 years ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆17Mar 3, 2024Updated 2 years ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆76Jan 3, 2026Updated 4 months ago
- ☆28Aug 14, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Teknofest Savaşan İHA Yarışması için geliştirilen Görüntü İşleme Görev Yazılımı☆22Jan 30, 2023Updated 3 years ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Updated this week
- ☆16Aug 25, 2021Updated 4 years ago
- A curated list of cyber security resources and tools.☆517Mar 26, 2026Updated last month
- Minimal Ethereum DAO using scaffold-eth and Tailwind CSS☆11Jul 11, 2022Updated 3 years ago
- Simple node.js linux only keylogger using events☆59Apr 5, 2019Updated 7 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆233Jan 27, 2025Updated last year
- Docker container and run scripts for MIT's xv6 kernel. Useful for USC CSCI 350.☆32Jan 24, 2024Updated 2 years ago
- Aave Umbrella smart contracts☆20Feb 17, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆179Feb 22, 2026Updated 2 months ago
- Market Arbitrage Dual-Listing Algorithmic Delta (Neutral) is a delta-neutral market-making algorithm that trades on the illiquid market …☆13Dec 30, 2021Updated 4 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Learn the technical skills for data analyst career paths, Develop your competencies in high-demand analysis tools, Build communication,…☆13Feb 18, 2021Updated 5 years ago
- Library Management System using HTML, CSS, JavaScript and Firebase.☆25Apr 23, 2026Updated 2 weeks ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,857Feb 13, 2026Updated 2 months ago