Learn Cyber Security-1 in 30 Days!
☆47Jul 11, 2020Updated 5 years ago
Alternatives and similar repositories for ismek-cybersecurity1-lessons
Users that are interested in ismek-cybersecurity1-lessons are comparing it to the libraries listed below
Sorting:
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- Akademik Bilişim - Web Uygulama Güvenliği ve Güvenli Kod Geliştirme eğitim içeriği☆18Feb 7, 2017Updated 9 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- ☆25Sep 29, 2021Updated 4 years ago
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- Gebze Teknik Üniversitesinde verilen Bilgi ve Ağ Güvenliği dersinin lab uygulamaları. Herbir uygulama kriptoloji alanındaki ayrı ayrı kon…☆18Nov 28, 2016Updated 9 years ago
- Tool to execute BREACH attack.☆26Jul 27, 2018Updated 7 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- a Swing GUI for Moss (for a Measure Of Software Similarity)☆15Apr 12, 2018Updated 7 years ago
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated 3 weeks ago
- Network Security Notes☆87Feb 21, 2017Updated 9 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Etkinlikteki herkesin üye olarak tanımlandığı, girip etkinliğe dair kendisindeki fotoğrafları yükleyebileceği ve herkesin katkıda bulundu…☆12Sep 2, 2016Updated 9 years ago
- A curriculum for a high school cyber security course.☆783Dec 17, 2023Updated 2 years ago
- Ağ ve Bilgi Güvenliği; Linux, Python, Risk Analizi, Kriptoloji, Steganografi, Zararlı Kod Analizi, Sızma Testi, Pasif Bilgi Toplama, Pasi…☆109Jan 21, 2024Updated 2 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆28Oct 2, 2020Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Angular4 with spring boot☆13Feb 27, 2023Updated 3 years ago
- ☆12Jan 6, 2025Updated last year
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- Repository for the lectures taught in the course named "Operating Systems Lab" at the University of Guilan, Department of Computer Engine…☆25Nov 8, 2023Updated 2 years ago
- Java ve C# dilinde hazırlanmış kodlarla nesneye yönelik programlama teknikleri örnekleri☆11Dec 28, 2024Updated last year
- Courses, guides, training and certification programs about blockchain.☆24Feb 5, 2021Updated 5 years ago
- [pip install medsegbench] 35x Standardized Medical Segmentation Datasets from Different Data Modalities☆29Nov 27, 2024Updated last year
- Android P2P communication over NFC☆19Jul 23, 2015Updated 10 years ago
- A list of telco security resources and projects.☆12Feb 22, 2020Updated 6 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago