Learn Cyber Security-1 in 30 Days!
☆47Jul 11, 2020Updated 5 years ago
Alternatives and similar repositories for ismek-cybersecurity1-lessons
Users that are interested in ismek-cybersecurity1-lessons are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Sep 29, 2021Updated 4 years ago
- Tool to execute BREACH attack.☆26Jul 27, 2018Updated 7 years ago
- ☆12Sep 21, 2019Updated 6 years ago
- a Swing GUI for Moss (for a Measure Of Software Similarity)☆15Apr 12, 2018Updated 8 years ago
- ☆43Aug 1, 2017Updated 8 years ago
- Some python projects that I've created over the years.☆43Nov 11, 2023Updated 2 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆30Dec 16, 2018Updated 7 years ago
- Etkinlikteki herkesin üye olarak tanımlandığı, girip etkinliğe dair kendisindeki fotoğrafları yükleyebileceği ve herkesin katkıda bulundu…☆12Sep 2, 2016Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆31Oct 26, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Selective wifi jammer - control who can connect where☆47Sep 12, 2017Updated 8 years ago
- A curriculum for a high school cyber security course.☆794Dec 17, 2023Updated 2 years ago
- Ağ ve Bilgi Güvenliği; Linux, Python, Risk Analizi, Kriptoloji, Steganografi, Zararlı Kod Analizi, Sızma Testi, Pasif Bilgi Toplama, Pasi…☆110Jan 21, 2024Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Template for the first course project.☆30Dec 24, 2018Updated 7 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆204Jan 18, 2023Updated 3 years ago
- ☆12Jan 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python GUI: Tkinter & PyQt5 with Real World Python Projects!☆30Oct 2, 2019Updated 6 years ago
- Repository for the lectures taught in the course named "Operating Systems Lab" at the University of Guilan, Department of Computer Engine…☆25Nov 8, 2023Updated 2 years ago
- Java ve C# dilinde hazırlanmış kodlarla nesneye yönelik programlama teknikleri örnekleri☆12Dec 28, 2024Updated last year
- Derin Öğrenme ile Geri Dönüştürülebilir Atıkların Sınıflandırılması☆15Dec 18, 2021Updated 4 years ago
- Courses, guides, training and certification programs about blockchain.☆24Feb 5, 2021Updated 5 years ago
- Temel anlattığımız konular. Her commit bir konu☆14Feb 7, 2017Updated 9 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- search ip cam on network☆21Aug 3, 2016Updated 9 years ago
- Java 14 Features☆13Oct 12, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extract Wi-Fi passwords from a non-rooted (really) Android phone☆18Apr 19, 2026Updated last month
- wirelessFirmware☆68Oct 31, 2020Updated 5 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆174Jan 2, 2018Updated 8 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago
- Linux images for Samsung Galaxy Tab 2 (unified) 7.0 10.0☆10Sep 20, 2022Updated 3 years ago
- 2018 - 2019 Bahar Dönemi Nesne Tabanlı Programlama Ders Notları (Python)☆14May 9, 2019Updated 7 years ago