oussama-rahali / CCSC_BootCamp_TrainingLinks
CIT Cyber Security Cell Bootcamp Training modules
☆38Updated 4 years ago
Alternatives and similar repositories for CCSC_BootCamp_Training
Users that are interested in CCSC_BootCamp_Training are comparing it to the libraries listed below
Sorting:
- Network Shredder IDS☆11Updated last year
- The Hack3r News B'darija☆18Updated 3 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 4 years ago
- ☆103Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19Updated 2 years ago
- Open Redirect scanner☆18Updated 3 years ago
- ☆33Updated 4 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- ☆45Updated 4 years ago
- ☆47Updated 8 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆30Updated 2 years ago
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆76Updated 3 years ago
- A collection of my adventures through hackthebox.eu☆38Updated 4 years ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Updated 4 years ago
- Penetration Testing Interview Questions☆52Updated 3 years ago
- You don't need wires to be connected☆42Updated 5 years ago
- Practice Labs☆104Updated 5 years ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated last year
- ☆51Updated 2 years ago
- A Project where I try to learn something new every day, and this is a place to track it☆18Updated 4 years ago
- ☆27Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- ☆14Updated 2 years ago
- Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.☆71Updated 3 weeks ago