nishant-kumarr / Slash-Mark
This repository holds some very beginner projects that I worked on related to cybersecurity.
☆14Updated 7 months ago
Alternatives and similar repositories for Slash-Mark:
Users that are interested in Slash-Mark are comparing it to the libraries listed below
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆12Updated last year
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆50Updated 3 weeks ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆11Updated 10 months ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆35Updated last year
- It is a advanced keylogger.☆48Updated 10 months ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆13Updated 3 months ago
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆52Updated last year
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆68Updated 2 years ago
- A collection of python cybersecurity projects☆41Updated last year
- Collection of Cyber Security Projects written in Python Script (executable on Linux terminal)☆65Updated 2 years ago
- Project for CyberSecurity Bachelor☆17Updated 3 years ago
- Cybersecurity Internship Project☆91Updated 2 years ago
- ☆32Updated last year
- Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate☆103Updated last year
- Study notes for the Certified Ethical Hacker v12.☆31Updated 2 years ago
- Certified Ethical Hacker (CEH) v12 Notes☆266Updated 3 weeks ago
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆107Updated 2 years ago
- Cybersecurity Resources☆29Updated 7 months ago
- CEH Practical☆52Updated last year
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆61Updated 6 months ago
- Hello, aspiring hackers! 🕵️♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absol…☆73Updated 3 months ago
- SOC Home Lab: Attack & Defense Simulation is a cybersecurity project that simulates real-world attack and defense scenarios in a controll…☆99Updated 2 months ago
- Spreading the word of: https://github.com/imrk51/CEH-v11-Study-Guide☆17Updated 2 years ago
- ☆104Updated last year
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆94Updated last month
- ☆23Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆10Updated 9 months ago
- my notes☆200Updated 4 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆287Updated 11 months ago
- 🔥 CEHv12 Certificate documentation 📚☆10Updated last year