A collection of awesome security hardening guides, tools and other resources
-
Updated
Oct 2, 2024
A collection of awesome security hardening guides, tools and other resources
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Respounder detects presence of responder in the network.
💻⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.
💻
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
👨🎓 北京交通大学计算机科学与技术学院研究生课程资料、笔记、回忆和整理的期末考试卷及课程作业。希望对你们有所帮助❤️,如果喜欢记得给个star🌟
This repository contains resources to get you started in the field of your choice.
All the homeworks, studies and projects I've done at Metu-CENG
👨💻 Computer Security algorithms in C#
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."