Intro to Cybersecurity
☆21Mar 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for intro-to-cybersecurity-dojo
Users that are interested in intro-to-cybersecurity-dojo are comparing it to the libraries listed below
Sorting:
- A dojo to teach the basics of low-level computing.☆22Feb 17, 2026Updated last month
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆136Jan 26, 2026Updated last month
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- ☆13Jan 7, 2026Updated 2 months ago
- Implementation of the languages from the EOPL textbook in Haskell and Standard ML.☆15Dec 22, 2019Updated 6 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- Yet another haskell term rewriting library☆18Aug 27, 2025Updated 6 months ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Common weakness enumeration library for Python (maintained fork of https://github.com/Julian-Nash/cwe )☆15Aug 29, 2024Updated last year
- ☆12Nov 2, 2022Updated 3 years ago
- Infrastructure powering the pwn.college dojo☆433Mar 3, 2026Updated 2 weeks ago
- Java implementation of the Louvain method of community detection in graphs☆11Dec 19, 2025Updated 2 months ago
- Tools for geospatial analysis of radar rainfall fields☆12Nov 30, 2016Updated 9 years ago
- A version-agnostic ghidra plugin for de-compiling Qualcomm Hexagon QDSP6☆29Mar 8, 2026Updated last week
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- ☆11Dec 15, 2022Updated 3 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- ☆25Dec 3, 2024Updated last year
- ☆13Jul 11, 2024Updated last year
- Python API for downloading and managing data. Checkout the documentation at:☆14Apr 29, 2019Updated 6 years ago
- A generic Haskell library for expressing rewrite rules with safe treatment of variables and binders☆12Jan 31, 2026Updated last month
- predicting vegetation health from precipitation and temperature☆12May 2, 2019Updated 6 years ago
- Full Stack E-Commerce + Dashboard & CMS offers a comprehensive solution for e-commerce businesses, providing a feature-rich admin portal …☆15Oct 19, 2024Updated last year
- Example of calling Haskell Function from Go program (using C interface)☆13Sep 30, 2021Updated 4 years ago
- A language-generic implementation of equality saturation in Haskell☆22Dec 4, 2018Updated 7 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- ☆15Jun 5, 2024Updated last year
- STOchastic Rainstorm Model (STORM)☆12Oct 3, 2021Updated 4 years ago
- ☆15May 22, 2023Updated 2 years ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 8 months ago
- egghead Lessons☆15Dec 16, 2020Updated 5 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆23Jun 13, 2023Updated 2 years ago
- A pleasing, light-on-dark, blue theme for Emacs 24.1 (port of the Vim theme)☆20Nov 23, 2015Updated 10 years ago
- IDA's Lumina feature, reimplemented for Binary Ninja, with new error handeling!☆40Dec 5, 2024Updated last year
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆20Jan 20, 2025Updated last year
- Academic Tracker is a package that can search PubMed, Crossref, ORCID, and Google Scholar for publications given a list of authors or pub…☆21Sep 4, 2024Updated last year
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated 2 weeks ago