Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source for CCSP certification, there could be more materials to refer. All these materials are solely used by myself while preparing for CCSP. Please follow official ISC2 materials from official website.
☆13Dec 31, 2023Updated 2 years ago
Alternatives and similar repositories for CCSP-Study-Material
Users that are interested in CCSP-Study-Material are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CCSP study resources, notes, exam material.☆48Jun 27, 2023Updated 2 years ago
- This repository serves as a comprehensive resource for integrating machine learning with security operations, offering innovative cyberse…☆38Feb 12, 2026Updated 2 months ago
- ☆29Dec 12, 2024Updated last year
- How to redirect the customer to a custom page after logging in☆14May 13, 2019Updated 6 years ago
- A Wordpress plugin for embedding PDFs using Mozilla's Excellent PDF.js☆11Apr 21, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- irssi's official theme collection☆13Jul 4, 2014Updated 11 years ago
- tor socks & dns proxy 🌐 🐳 🐙☆12Feb 14, 2026Updated 2 months ago
- Cyber Warfare is a free and open source international intrusion detection and prevention advisory☆19Aug 13, 2024Updated last year
- Python wrapper for https://www.getdrip.com/☆12Dec 8, 2022Updated 3 years ago
- kibana 4 in docker☆14Sep 6, 2016Updated 9 years ago
- An eBPF-based behavioral monitor for AI coding agents.☆133Mar 28, 2026Updated last month
- Dark Mode version of White Paper theme☆17Apr 29, 2026Updated last week
- Retraining a TensorFlow object detection model to look for squirrels.☆18Dec 27, 2024Updated last year
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Jul 27, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Ansible role that will setup full LEMP stack with redis caching for Magento 2 CE on RHEL/CentOS 7.☆14Sep 14, 2021Updated 4 years ago
- Infrastructure as Code (IaC) repository for deploying and managing Azure resources using Bicep. It also includes examples of working with…☆20Apr 22, 2026Updated 2 weeks ago
- A library to make manipulating F5 loadbalancers easy☆15Mar 25, 2016Updated 10 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated 2 years ago
- LibreWeb Browser - Decentralized Web Browser (mirror of https://gitlab.melroy.org/libreweb/browser)☆25Mar 6, 2026Updated 2 months ago
- IT Risk Management tools☆16Apr 4, 2025Updated last year
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- ☆30Apr 16, 2015Updated 11 years ago
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆10May 5, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆60Jan 20, 2026Updated 3 months ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 5 years ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆31Aug 30, 2025Updated 8 months ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- This python script uses the Pocket API (http://getpocket.com/developer/) to back up all of your data, separated by tags and fixing link n…☆20Jul 22, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated DJ system for drum and bass in Python 3☆23Jun 17, 2024Updated last year
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 5 months ago
- This project provides a docker image to run a jupyter notebook server with essentia, freesound-python and a set of python dependencies co…☆23Jan 14, 2022Updated 4 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆35Sep 28, 2022Updated 3 years ago
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- A list of wireless cards tested with the dual-card injection test and in the field☆27Oct 21, 2018Updated 7 years ago
- A tutorial for using Essentia in Python☆25Jan 12, 2022Updated 4 years ago