notes
☆153Nov 19, 2025Updated 3 months ago
Alternatives and similar repositories for cybersecurity-note
Users that are interested in cybersecurity-note are comparing it to the libraries listed below
Sorting:
- ☆10Apr 26, 2025Updated 10 months ago
- 100 days of cybersecurity - join Discord and connect with us to know more on this challenge #100daysofcybersecurity #sector21☆227Jan 10, 2026Updated last month
- ☆38Aug 19, 2025Updated 6 months ago
- Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machin…☆18Dec 1, 2022Updated 3 years ago
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆27Jan 21, 2025Updated last year
- a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM☆1,052Oct 22, 2025Updated 4 months ago
- Books☆16Feb 25, 2021Updated 5 years ago
- ☆10Apr 13, 2025Updated 10 months ago
- CTF source code(s) from multiple websites.☆10May 4, 2025Updated 10 months ago
- ☆24May 29, 2025Updated 9 months ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆20Nov 10, 2024Updated last year
- ☆10Oct 1, 2023Updated 2 years ago
- Front-End, React, JavaScript Interview & DSA☆13Sep 15, 2025Updated 5 months ago
- ☆25Mar 1, 2023Updated 3 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆20Apr 30, 2025Updated 10 months ago
- ☆18Jun 15, 2024Updated last year
- Coder Army by Rohit Negi for DSA in C++/cpp. https://tinyurl.com/coderarmytracker #180DaysOfCode #180DaysOfDSA Data Structures and Algori…☆20Jul 18, 2024Updated last year
- CTF and Bug Bounty Hunting WriteUps.☆21Feb 20, 2026Updated last week
- This repository contains AI models that identify deceptive content and combat misinformation☆29Sep 17, 2023Updated 2 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Republic of India☆36Jan 30, 2025Updated last year
- ☆29Nov 1, 2024Updated last year
- A summary of the most abbreviations I encountered so far☆28Jan 18, 2026Updated last month
- Study material (pdfs, notes, free course download links etc) for HACKERS☆29Nov 18, 2023Updated 2 years ago
- 🔒 A simple password manager built with Python. Password generation, AES Encryption, and SHA256 Hashing.☆22Jan 5, 2024Updated 2 years ago
- GitHub version of https://start.me/p/L1rEYQ/osint4all☆34Jul 9, 2022Updated 3 years ago
- Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate☆139Oct 3, 2023Updated 2 years ago
- A MySQL Project which depicts a sample database of the ICC Cricket World Cup☆21Aug 29, 2020Updated 5 years ago
- A blockchain based supply chain management application.☆38Feb 23, 2026Updated last week
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆47Jun 1, 2021Updated 4 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- ☆42Feb 24, 2026Updated last week
- ☆37Feb 26, 2019Updated 7 years ago
- ☆40Jan 7, 2022Updated 4 years ago
- Comprehensive training materials for the CEH v12 exam, including detailed modules, practical exercises, hands-on labs, and best practices…☆56Mar 8, 2025Updated 11 months ago
- ☆42May 20, 2021Updated 4 years ago
- Study material for NFSU Msc Cyber Security☆153Dec 6, 2025Updated 2 months ago
- Furniture e-commerce app that uses augmented reality☆52Mar 12, 2024Updated last year
- my notes☆247Feb 21, 2026Updated last week
- ☆87Sep 22, 2025Updated 5 months ago