Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source for CCSP certification, there could be more materials to refer. All these materials are solely used by myself while preparing for CCSP. Please follow official ISC2 materials from official website.
☆13Dec 31, 2023Updated 2 years ago
Alternatives and similar repositories for CCSP-Study-Material
Users that are interested in CCSP-Study-Material are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CCSP study resources, notes, exam material.☆46Jun 27, 2023Updated 2 years ago
- This repository serves as a comprehensive resource for integrating machine learning with security operations, offering innovative cyberse…☆34Feb 12, 2026Updated last month
- ☆29Dec 12, 2024Updated last year
- How to redirect the customer to a custom page after logging in☆14May 13, 2019Updated 6 years ago
- A Wordpress plugin for embedding PDFs using Mozilla's Excellent PDF.js☆11Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- irssi's official theme collection☆13Jul 4, 2014Updated 11 years ago
- tor socks & dns proxy 🌐 🐳 🐙☆12Feb 14, 2026Updated last month
- Cyber Warfare is a free and open source international intrusion detection and prevention advisory☆19Aug 13, 2024Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Python wrapper for https://www.getdrip.com/☆12Dec 8, 2022Updated 3 years ago
- kibana 4 in docker☆14Sep 6, 2016Updated 9 years ago
- Dark Mode version of White Paper theme☆17Feb 11, 2026Updated last month
- Retraining a TensorFlow object detection model to look for squirrels.☆18Dec 27, 2024Updated last year
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Jul 27, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ansible role that will setup full LEMP stack with redis caching for Magento 2 CE on RHEL/CentOS 7.☆14Sep 14, 2021Updated 4 years ago
- A library to make manipulating F5 loadbalancers easy☆15Mar 25, 2016Updated 10 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated 2 years ago
- LibreWeb Browser - Decentralized Web Browser (mirror of https://gitlab.melroy.org/libreweb/browser)☆24Mar 6, 2026Updated 2 weeks ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆10May 5, 2020Updated 5 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- ☆60Jan 20, 2026Updated 2 months ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 4 years ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Aug 30, 2025Updated 6 months ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- This python script uses the Pocket API (http://getpocket.com/developer/) to back up all of your data, separated by tags and fixing link n…☆20Jul 22, 2013Updated 12 years ago
- Automated DJ system for drum and bass in Python 3☆23Jun 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This project provides a docker image to run a jupyter notebook server with essentia, freesound-python and a set of python dependencies co…☆23Jan 14, 2022Updated 4 years ago
- CABTA (Blue Team Assistant) - AI-Powered SOC Platform for Threat Analysis, IOC Investigation & Email Forensics☆51Updated this week
- A tutorial for using Essentia in Python☆24Jan 12, 2022Updated 4 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Sep 28, 2022Updated 3 years ago
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- A list of wireless cards tested with the dual-card injection test and in the field☆27Oct 21, 2018Updated 7 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago