Cybersecurity handbook by One Beyond
β114Jul 20, 2023Updated 2 years ago
Alternatives and similar repositories for cybersecurity-handbook
Users that are interested in cybersecurity-handbook are comparing it to the libraries listed below
Sorting:
- π JS pills: a collection of short snippets of javascript for learning purposesβ12Apr 17, 2024Updated last year
- Express middleware for simple pagination. Easy way to handle limit and offsetβ13Jan 8, 2023Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.β27Jan 2, 2021Updated 5 years ago
- Un proyecto sobre metadatos del guild de ciberseguridadβ12Dec 6, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforceβ13Jan 7, 2025Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and researchβ12Jun 10, 2017Updated 8 years ago
- Zero dependency Model generator based on the method of least squares. Written in plain JS.β11Apr 1, 2024Updated last year
- A set of code challenges for One Beyond interviewsβ16Jun 24, 2025Updated 8 months ago
- Tool for visualizing the Open SSF Scorecard Api data in a human friendly wayβ19Nov 27, 2025Updated 3 months ago
- β12Dec 26, 2021Updated 4 years ago
- β37Jun 29, 2022Updated 3 years ago
- β18Aug 13, 2020Updated 5 years ago
- Inject different payloads in the log of your targetβ18Apr 3, 2022Updated 3 years ago
- SSH Ncurses interface to give you a "graphic" overview of your connectionsβ45Nov 29, 2025Updated 3 months ago
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.ππβ656May 4, 2024Updated last year
- contains non confidential smart contracts from eterlandβ16Jun 8, 2023Updated 2 years ago
- Create custom AMIs with Packer and Ansible to enable rapid provisioning of offensive infrastructure in AWS using Terraform.β21Dec 1, 2022Updated 3 years ago
- Here is where I upload all the notes i take about the Ethereum world to share with everyone.β23Nov 6, 2018Updated 7 years ago
- β22Feb 10, 2025Updated last year
- β22Jun 2, 2023Updated 2 years ago
- Awesome list of well crafted Node.js packages.β24Feb 14, 2021Updated 5 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. Pβ¦β27Jan 2, 2023Updated 3 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactionsβ12Feb 8, 2023Updated 3 years ago
- Certified Kubernetes Administrator exam cluster(s) for training!β22Nov 18, 2019Updated 6 years ago
- β65Jun 5, 2021Updated 4 years ago
- β65Sep 18, 2025Updated 5 months ago
- Send an issue to propose a talk!β25Jan 16, 2022Updated 4 years ago
- Getting started in bug bounty!β33Jul 16, 2021Updated 4 years ago
- Lightweight yet full-featured, highly-extensible charting platform.β12Feb 7, 2026Updated 3 weeks ago
- someone needs helpβ66Jul 25, 2022Updated 3 years ago
- A list of bookmarks I have used since I started my journey in cyber securityβ288Aug 31, 2022Updated 3 years ago
- The Missing check on Laravel Request Unicity.β10Oct 23, 2023Updated 2 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in aβ¦β72Mar 5, 2022Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.β41Apr 10, 2023Updated 2 years ago
- A browser extension to display DALL-E 2 generated images alongside Google images search resultsβ36Dec 14, 2022Updated 3 years ago
- β39Mar 12, 2021Updated 4 years ago
- In this repository, I try to perform a mainnet fork and then simulate popular smart contract exploits on various DEFI Protocols using Harβ¦β33Sep 6, 2022Updated 3 years ago
- stmctf22β35Nov 16, 2022Updated 3 years ago
- Some notes written during my OSCP Journey (KeepNote project)β10Mar 2, 2020Updated 6 years ago