oussama-rahali / CCSC_BootCamp_TrainingLinks
CIT Cyber Security Cell Bootcamp Training modules
☆38Updated 4 years ago
Alternatives and similar repositories for CCSC_BootCamp_Training
Users that are interested in CCSC_BootCamp_Training are comparing it to the libraries listed below
Sorting:
- Network Shredder IDS☆11Updated 10 months ago
- The Hack3r News B'darija☆18Updated 2 years ago
- Open Redirect scanner☆18Updated 3 years ago
- Osint French People Location☆15Updated 2 years ago
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- ☆14Updated last year
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆17Updated last year
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 3 years ago
- Ray-casting game for wasting productive time.☆11Updated 4 years ago
- The Hacking Week☆2Updated 2 years ago
- CTF Writeups☆60Updated 11 months ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- A Project where I try to learn something new every day, and this is a place to track it☆17Updated 3 years ago
- SecDojo 23jan CTF writeup.☆15Updated 3 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated 11 months ago
- Test your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻☆46Updated 4 months ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- Penetration Testing Interview Questions☆41Updated 3 years ago
- ☆52Updated 2 years ago
- Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨☆26Updated last year
- My attempt to reverse the Discord nitro token generation function.☆29Updated 8 months ago
- BnademOverFlow's Official Website☆36Updated 2 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- ☆48Updated 4 years ago
- A list of awesome penetration testing tools and resources.☆81Updated last year
- ✍️ A curated list of CVE PoCs.☆12Updated 7 years ago
- linux debugger☆11Updated last year
- Yet another web recon tool☆62Updated last year