Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source for CCSP certification, there could be more materials to refer. All these materials are solely used by myself while preparing for CCSP. Please follow official ISC2 materials from official website.
☆13Dec 31, 2023Updated 2 years ago
Alternatives and similar repositories for CCSP-Study-Material
Users that are interested in CCSP-Study-Material are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CCSP study resources, notes, exam material.☆46Jun 27, 2023Updated 2 years ago
- This repository serves as a comprehensive resource for integrating machine learning with security operations, offering innovative cyberse…☆37Feb 12, 2026Updated 2 months ago
- ☆29Dec 12, 2024Updated last year
- How to redirect the customer to a custom page after logging in☆14May 13, 2019Updated 6 years ago
- A Wordpress plugin for embedding PDFs using Mozilla's Excellent PDF.js☆11Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- irssi's official theme collection☆13Jul 4, 2014Updated 11 years ago
- tor socks & dns proxy 🌐 🐳 🐙☆12Feb 14, 2026Updated 2 months ago
- Cyber Warfare is a free and open source international intrusion detection and prevention advisory☆19Aug 13, 2024Updated last year
- Python wrapper for https://www.getdrip.com/☆12Dec 8, 2022Updated 3 years ago
- kibana 4 in docker☆14Sep 6, 2016Updated 9 years ago
- An eBPF-based behavioral monitor for AI coding agents.☆130Mar 28, 2026Updated 2 weeks ago
- Dark Mode version of White Paper theme☆17Feb 11, 2026Updated 2 months ago
- Retraining a TensorFlow object detection model to look for squirrels.☆18Dec 27, 2024Updated last year
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Jul 27, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ansible role that will setup full LEMP stack with redis caching for Magento 2 CE on RHEL/CentOS 7.☆14Sep 14, 2021Updated 4 years ago
- Infrastructure as Code (IaC) repository for deploying and managing Azure resources using Bicep. It also includes examples of working with…☆20Mar 1, 2026Updated last month
- A library to make manipulating F5 loadbalancers easy☆15Mar 25, 2016Updated 10 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated 2 years ago
- LibreWeb Browser - Decentralized Web Browser (mirror of https://gitlab.melroy.org/libreweb/browser)☆24Mar 6, 2026Updated last month
- IT Risk Management tools☆14Apr 4, 2025Updated last year
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆10May 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- Convert your HackerOne reports into reusable AI skills.☆85Mar 9, 2026Updated last month
- ☆60Jan 20, 2026Updated 2 months ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 4 years ago
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆31Aug 30, 2025Updated 7 months ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This python script uses the Pocket API (http://getpocket.com/developer/) to back up all of your data, separated by tags and fixing link n…☆20Jul 22, 2013Updated 12 years ago
- Automated DJ system for drum and bass in Python 3☆23Jun 17, 2024Updated last year
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 5 months ago
- This project provides a docker image to run a jupyter notebook server with essentia, freesound-python and a set of python dependencies co…☆23Jan 14, 2022Updated 4 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Sep 28, 2022Updated 3 years ago
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- A list of wireless cards tested with the dual-card injection test and in the field☆27Oct 21, 2018Updated 7 years ago