A collection of awesome security hardening guides, tools and other resources
-
Updated
Oct 2, 2024
A collection of awesome security hardening guides, tools and other resources
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Respounder detects presence of responder in the network.
💻
💻⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.
👨🎓 北京交通大学计算机科学与技术学院研究生课程资料、笔记、回忆和整理的期末考试卷及课程作业。希望对你们有所帮助❤️,如果喜欢记得给个star🌟
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
This repository contains resources to get you started in the field of your choice.
All the homeworks, studies and projects I've done at Metu-CENG
👨💻 Computer Security algorithms in C#
Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
A curated list of awesome LLM Red Teaming training, resources, and tools.
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
A curated list of sanitizers to detect bugs
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."