Stars
This course teaches how to create Red Hat Device Edge images for edge devices and kiosk computers.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prepare for the CompTIA Security+ certification exam, an essenti…
Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. Helpful resource for CTF Challenges.
The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes
This repository contains a collection of important notes and commands for the Certified Ethical Hacker (CEH) practical exam. Aspiring CEH professionals will find these resources invaluable in their…
CEH Practical Resources, Learning, Tutorials | Certified Ethical Hacker
A collection of various awesome lists for hackers, pentesters and security researchers
Top 100 Hacking & Security E-Books (Free Download)
A Python library for the Docker Engine API
🌈Python standard libraries cheatsheet for human
Linux-native "fake root" for implementing rootless containers
Find broken links, missing images, etc within your HTML.
pefile is a Python module to read and work with PE (Portable Executable) files
eBPF implementation that runs on top of Windows
An open source, cloud-native security to protect everything from build to runtime
Concise, consistent, and legible badges in SVG and raster format
A basic user tool to execute simple docker containers in batch or interactive systems without root privileges.
an SSO and OAuth / OIDC login solution for Nginx using the auth_request module