oussama-rahali / CCSC_BootCamp_TrainingLinks
CIT Cyber Security Cell Bootcamp Training modules
☆38Updated 4 years ago
Alternatives and similar repositories for CCSC_BootCamp_Training
Users that are interested in CCSC_BootCamp_Training are comparing it to the libraries listed below
Sorting:
- Network Shredder IDS☆11Updated last year
- The Hack3r News B'darija☆18Updated 2 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- ☆101Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Gonna share my writeups and resources here☆68Updated 10 months ago
- ☆51Updated 2 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- Writeups for CTF challenges.☆79Updated 2 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- Penetration Testing Interview Questions☆51Updated 3 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- blue team, red team stuff. All things cyber ;)☆78Updated 6 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- A collection of my adventures through hackthebox.eu☆36Updated 4 years ago
- ☆48Updated 7 years ago
- Rodan Exploitation Framework☆102Updated 3 years ago
- List of red team resources☆99Updated 8 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- a vulnerable GraphQL application☆19Updated 5 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- My notes from courses,books ..etc☆48Updated this week
- Pentest stuff☆49Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- Practice Labs☆101Updated 4 years ago