A collection of awesome security hardening guides, tools and other resources
-
Updated
Jun 24, 2024
A collection of awesome security hardening guides, tools and other resources
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Respounder detects presence of responder in the network.
💻⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.
💻
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
This repository contains resources to get you started in the field of your choice.
👨🎓 北京交通大学计算机科学与技术学院研究生课程资料、笔记、回忆和整理的期末考试卷及课程作业。希望对你们有所帮助❤️,如果喜欢记得给个star🌟
All the homeworks, studies and projects I've done at Metu-CENG
👨💻 Computer Security algorithms in C#
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam). A nodejs script to guess cyberoam password for any given username.
TriFlow: Triaging Android Applications using Speculative Information Flows
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."