In depth guide for cybersecurity interviews
☆148Jul 19, 2022Updated 3 years ago
Alternatives and similar repositories for cybersecurity-interview-guide
Users that are interested in cybersecurity-interview-guide are comparing it to the libraries listed below
Sorting:
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Interview fo…☆66Mar 7, 2022Updated 4 years ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆120Nov 18, 2024Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- Crane POAM Automation Tool (C-PAT™)☆15Feb 28, 2026Updated last week
- List of questions, answers and random notes for security interviews☆72May 7, 2021Updated 4 years ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆65Mar 21, 2020Updated 5 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆138Feb 25, 2023Updated 3 years ago
- Cyber Security Interview Questions ( and some answers )☆91Nov 2, 2023Updated 2 years ago
- SOC Interview Questions☆1,261Sep 10, 2024Updated last year
- FedRAMP Documentation☆46Updated this week
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆422Dec 28, 2024Updated last year
- ☆45Oct 19, 2021Updated 4 years ago
- ☆11Sep 6, 2017Updated 8 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- ☆24Feb 5, 2026Updated last month
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- A fresh and calming theme for Hyprland inspired by nature. Green Garden brings a vibrant yet soothing feel to your desktop. Let me know w…☆23Feb 3, 2026Updated last month
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- A hands-on, real-world GRC lab series built for beginners and curious pros alike. No PDFs. No gatekeeping. Just practical labs for unders…☆94Nov 6, 2025Updated 4 months ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- An Android Instrumentation tool to compute Code Coverage☆18Jul 25, 2025Updated 7 months ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- Trophy list of zero-day vulnerabilities that I discovered☆11May 6, 2024Updated last year
- A fool-proof bash script to clone MIFARE Classic card with a NFC reader☆14Feb 9, 2021Updated 5 years ago
- Okta MCP Server☆20Aug 19, 2025Updated 6 months ago
- Nethermind documentation☆10Feb 25, 2026Updated last week
- Calculate the number of nuclear reactors needed for the energy wasted by cryptocurrency mining☆11Mar 8, 2025Updated 11 months ago
- A C# irc bot malware POC.☆12Jul 29, 2014Updated 11 years ago
- A Fusion Systems Code ☀☆12Oct 21, 2018Updated 7 years ago
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 3 months ago
- Holds the research group website.☆13Feb 13, 2026Updated 3 weeks ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago