A collection of awesome security hardening guides, tools and other resources
-
Updated
Apr 4, 2024
A collection of awesome security hardening guides, tools and other resources
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Respounder detects presence of responder in the network.
💻⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.
💻
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
This repository contains resources to get you started in the field of your choice.
All the homeworks, studies and projects I've done at Metu-CENG
👨💻 Computer Security algorithms in C#
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
TriFlow: Triaging Android Applications using Speculative Information Flows
A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."