nimari / encryptionLinks
☆10Updated last year
Alternatives and similar repositories for encryption
Users that are interested in encryption are comparing it to the libraries listed below
Sorting:
- ☆478Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆1,051Updated 8 months ago
- This repository holds the Python scripts discussed in the Infosec Institute's Python for Cybersecurity learning Path☆392Updated 2 years ago
- SOC Interview Questions☆1,239Updated last year
- Useful resources for SOC Analyst and SOC Analyst candidates.☆854Updated 2 years ago
- Study Guide for CEH v10 exam☆314Updated 5 years ago
- Practical Windows Forensics Training☆704Updated last year
- Resources for TCM Security Linux 101 course☆312Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆750Updated last month
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,587Updated last week
- IoT Digital Forensics Course with hands-on labs☆230Updated 3 months ago
- Malware Analysis Fundamentals, by EC-Council☆22Updated 4 years ago
- 💻 Certified ethical hacker summary in bullet points☆1,136Updated last year
- I have collected many Free Resources. Feel free share more resources☆316Updated 2 years ago
- ☆1,353Updated 2 years ago
- ☆41Updated 2 years ago
- ☆40Updated 3 years ago
- A curated list of awesome Memory Forensics for DFIR☆505Updated 10 months ago
- undergroundwires CEH-in-bullet-points in pdf format☆119Updated 2 years ago
- ☆96Updated 7 months ago
- A book covering the whole spectrum of Malware☆36Updated last year
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆334Updated last year
- https://academy.tcm-sec.com/☆158Updated 6 months ago
- 🛡️ Master the essentials of SOC/Security Analysis with our 12-day SOC Analyst Prerequisites Learning Path, covering Linux, Windows, netw…☆19Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆698Updated 7 months ago
- Everything related to Linux Forensics☆711Updated 2 years ago
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆141Updated last year
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆194Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,595Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆676Updated last year