Ans to the FAQ: How do you self-learn information security?
☆29Mar 12, 2018Updated 8 years ago
Alternatives and similar repositories for how-to-self-learn-infosec
Users that are interested in how-to-self-learn-infosec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A data visualization project to show the taxi availability in Singapore☆12Jan 30, 2017Updated 9 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆38Feb 12, 2016Updated 10 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 7 years ago
- A manually curated list of all security internships available for summer 2017.☆18Sep 25, 2016Updated 9 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Non-Alphanumeric Ruby for Fun and Not Much Else☆22Mar 19, 2014Updated 12 years ago
- ☆12Apr 10, 2018Updated 8 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- Decentralized IPFS Pinning Service AVS☆13Oct 28, 2024Updated last year
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- small utility to dump kernel memory☆26Jul 23, 2014Updated 11 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- keeloq cypher decode need 14hour+☆15Feb 18, 2016Updated 10 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆23Aug 25, 2017Updated 8 years ago
- Switcheo TradeHub node binaries☆11Oct 4, 2021Updated 4 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Web status page for Litecoin (and similar) full nodes☆16Apr 6, 2024Updated 2 years ago
- A spaced repetition web app in Django☆21Nov 24, 2012Updated 13 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆40Apr 21, 2015Updated 10 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- ☆18May 3, 2016Updated 9 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆21Apr 26, 2025Updated 11 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- ☆13Jul 9, 2014Updated 11 years ago
- Aspects of the Oyster Protocol that run on the visitors of websites☆19Nov 14, 2018Updated 7 years ago
- Collection of HDP Tuning Tricks & Tips (unofficial guide)☆17Sep 26, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆20Jan 9, 2019Updated 7 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 7 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Zilliqa On-chain DEX☆20Jan 25, 2024Updated 2 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago