Automated Active Directory Enumeration
-
Updated
Nov 7, 2024 - PowerShell
Automated Active Directory Enumeration
Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security researchers, pentesting, api security, network security, mobile security and so on with helpful resources, guidelines
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
CyberPunkOS is a virtual machine that incorporates several tools for Open Source Intelligence (OSINT) to dismantle Fake News
Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... These are free to use and publicly available slides. But, don't forget to give the credit to the owners!
Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Dive into detailed insights covering network security, incident response, threat intelligence, and more. Enhance your cybersecurity expertise as we learn together.
Cybersecurity Tips When Working Remote
A Discord Bot for Backdoors and Breaches. Pre-Alpha State Is Not Fully Functional
Infinite cURL Attack
A Step by Step Guide for Cyber Security Beginners to Jump into the right path
Explore our comprehensive Cybersecurity Tool Guide featuring 101 essential tools. The ultimate resource for professionals to bolster their security strategies.
Discord bot providing randomized cybersecurity scenarios and questions to help with awareness training and prevention. Docker container ready.
Web application created to introduce beginners to cybersecurity and the OWASP Top 10
Cyber Security Awareness Framework Infrastructure as Code
A structured list of honeypots software that allows quickly searches.
Learning resources for cybersecurity including youtube, github, books, videos, courses, labs, articles etc. at one place
POC of a Advanced keylogger and covert channel - Remotely receiving victim's keystrokes and clipboard data. emulating an illegal covert channel between the victim and the attacker
FAQs for career building in cybersecurity
Add a description, image, and links to the cybersecurity-awareness topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-awareness topic, visit your repo's landing page and select "manage topics."