💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
-
Updated
Jan 17, 2024
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A collection of awesome security hardening guides, tools and other resources
This repository contains resources to get you started in the field of your choice.
💻⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.
Respounder detects presence of responder in the network.
💻
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
👨💻 Computer Security algorithms in C#
All the homeworks, studies and projects I've done at Metu-CENG
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity
My collection of awesome resources, tools, and other shiny things for cyber security stuffs. 😎 😈
Secure Chatting Application developed by PHP and JavaScript.
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Cryptography Algorithm Implementations
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."