☆112Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for IntroToCyberSecurity
Users that are interested in IntroToCyberSecurity are comparing it to the libraries listed below
Sorting:
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- ☆410Jun 27, 2024Updated last year
- ☆120May 26, 2025Updated 9 months ago
- Credentials recovery project☆16Mar 13, 2019Updated 6 years ago
- ☆12Apr 8, 2022Updated 3 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- code written on artificial intelligence lab at school☆10Oct 4, 2021Updated 4 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆18Feb 13, 2026Updated 3 weeks ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆56Aug 25, 2023Updated 2 years ago
- ☆10Mar 24, 2023Updated 2 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- The Adhan, is the Islamic call to prayer, recited by the muezzin at prescribed times of the day.☆13Aug 20, 2012Updated 13 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆10May 18, 2022Updated 3 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- ☆19Nov 22, 2025Updated 3 months ago
- ☆13Mar 29, 2021Updated 4 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ☆14Dec 24, 2025Updated 2 months ago
- ☆12Jun 4, 2025Updated 9 months ago
- 😌 Custom 1Blocker rules that make the Web a nicer place☆12Apr 18, 2020Updated 5 years ago
- مكتبة جافا سكربت باللغة العربية☆15Mar 4, 2019Updated 7 years ago
- A curated and collaborative list of awesome Crossplane resources☆15Apr 17, 2024Updated last year
- Deterministic iOS 7-9 64-bit Kernel Exploit☆32Updated this week
- Telegram bot with a graphical interface that enables you to schedule messages and generate automatic replies 🤖☆12Jul 10, 2023Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- ☆13Mar 21, 2024Updated last year
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- ☆11Oct 25, 2021Updated 4 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- ☆51Mar 29, 2022Updated 3 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- An automated whatsapp message scheduler.☆11Sep 27, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago