Intro to Cybersecurity
☆23Apr 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for intro-to-cybersecurity-dojo
Users that are interested in intro-to-cybersecurity-dojo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A dojo to teach the basics of low-level computing.☆23Apr 2, 2026Updated last month
- Software Exploitation☆11Sep 22, 2025Updated 7 months ago
- Example of how you can create your own dojo☆14Sep 2, 2025Updated 8 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- plugin for storing and using snippets of useful Binja script☆29Jan 11, 2026Updated 4 months ago
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆139Jan 26, 2026Updated 3 months ago
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- Source for the UnBlur Quora chrome extension☆15Mar 15, 2021Updated 5 years ago
- ☆15Mar 18, 2025Updated last year
- ☆13Jan 7, 2026Updated 4 months ago
- A Haskell-embedded computer algebra system that knows nothing about algebra, at the core.☆17Mar 16, 2024Updated 2 years ago
- This is an Simple Calculator Project based on Python and tkinter☆14Apr 10, 2020Updated 6 years ago
- Yet another haskell term rewriting library☆18Aug 27, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- ☆12Nov 2, 2022Updated 3 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- Java implementation of the Louvain method of community detection in graphs☆11Dec 19, 2025Updated 5 months ago
- A version-agnostic ghidra plugin for de-compiling Qualcomm Hexagon QDSP6☆33Mar 18, 2026Updated 2 months ago
- ☆11Dec 15, 2022Updated 3 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆14Aug 16, 2022Updated 3 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- Mirror of core.typed for internal development.☆14Nov 18, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- ☆13Jul 11, 2024Updated last year
- A generic Haskell library for expressing rewrite rules with safe treatment of variables and binders☆12Jan 31, 2026Updated 3 months ago
- Full Stack E-Commerce + Dashboard & CMS offers a comprehensive solution for e-commerce businesses, providing a feature-rich admin portal …☆14Oct 19, 2024Updated last year
- SIGPwny's websites and club content monorepo☆13May 6, 2026Updated 2 weeks ago
- 整理的一些hw前期准备工作 以及针对攻击者的溯源思路 水平较菜,如有错误或者遗漏的地方还请各位指正 参考资料较多 动态 IP 移动基站 代理池IP(谷歌、百度 是否有处于代理池C段) 国外扫描傀儡机(被标记时间普遍较久、扫描目标众多) 动态域名服务商(如花生壳、公云等) …☆21Apr 3, 2021Updated 5 years ago
- IDA's Lumina feature, reimplemented for Binary Ninja☆29Feb 22, 2023Updated 3 years ago
- The Zenon theorem prover☆16Jul 19, 2023Updated 2 years ago
- 网络安全工具汇总☆17Aug 31, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- ☆15Jun 5, 2024Updated last year
- GreyHack Vim implementation☆14Jan 1, 2024Updated 2 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆24Jun 13, 2023Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆25Feb 20, 2024Updated 2 years ago
- A pleasing, light-on-dark, blue theme for Emacs 24.1 (port of the Vim theme)☆20Nov 23, 2015Updated 10 years ago
- IDA's Lumina feature, reimplemented for Binary Ninja, with new error handeling!☆40Dec 5, 2024Updated last year