j4k0m / really-good-cybersec
A really good cybersec reading materials.
☆13Updated 2 years ago
Alternatives and similar repositories for really-good-cybersec:
Users that are interested in really-good-cybersec are comparing it to the libraries listed below
- The Hacking Week☆2Updated 2 years ago
- SecDojo 23jan CTF writeup.☆13Updated 3 years ago
- ☆14Updated last year
- The Hack3r News B'darija☆18Updated 2 years ago
- Akasec's CTF Writeups archive☆13Updated 2 years ago
- Collection of hacking tools, and ideas you might need to practice ethical hacking.☆28Updated 2 years ago
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- Piscine 1337 futureisloading-Juillet 2018☆26Updated 6 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 5 months ago
- Cyber Odyssey 2024 : Qualifications Challenges.☆12Updated 3 months ago
- 42 header for neovim made with lua☆11Updated 2 years ago
- Open Redirect scanner☆18Updated 2 years ago
- Osint French People Location☆15Updated 2 years ago
- some of my IOCs from malware investigations☆10Updated 2 years ago
- i implemented public key cryptosystem, based of RSA algorithme .☆11Updated 2 years ago
- CTF Writeups☆60Updated 7 months ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- Practice typing and improve your typing speed (WPM).☆10Updated 4 years ago
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 2 years ago
- CIT Cyber Security Cell Bootcamp Training modules☆37Updated 3 years ago
- Ray-casting game for wasting productive time.☆11Updated 3 years ago
- ☆8Updated 2 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- Source code for all the challenges posted in Akasec CTF 2024(with some writeups).☆28Updated 6 months ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated 7 months ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated 11 months ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- bot for the 1337 school discord server☆20Updated 3 years ago
- A docker image contains tools for developing and debuging your 42 projects.☆22Updated 2 years ago