Automate Active Directory Enumeration
-
Updated
Jun 24, 2024 - PowerShell
Automate Active Directory Enumeration
Skills and career roadmap for various security roles like application security, cloud security, DevSecOps, security engineer, security researchers, pentesting, api security, network security, mobile security and so on with helpful resources, guidelines
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
CyberPunkOS is a virtual machine that incorporates several tools for Open Source Intelligence (OSINT) to dismantle Fake News
Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... These are free to use and publicly available slides. But, don't forget to give the credit to the owners!
Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Dive into detailed insights covering network security, incident response, threat intelligence, and more. Enhance your cybersecurity expertise as we learn together.
Cybersecurity Tips When Working Remote
A Discord Bot for Backdoors and Breaches. Pre-Alpha State Is Not Fully Functional
Infinite cURL Attack
A Step by Step Guide for Cyber Security Beginners to Jump into the right path
Explore our comprehensive Cybersecurity Tool Guide featuring 101 essential tools. The ultimate resource for professionals to bolster their security strategies.
Discord bot providing randomized cybersecurity scenarios and questions to help with awareness training and prevention. Docker container ready.
Web application created to introduce beginners to cybersecurity and the OWASP Top 10
A structured list of honeypots software that allows quickly searches.
Advanced keylogger and covert channel - for receiving victim's keystrokes and clipboard data. You can send the results to the attacker's Email when the execution is finished, as well as write the digits from the target machine locally to a file
Cyber Security Awareness Framework Infrastructure as Code
This training module contains cybersecurity frameworks have been developed that comprise best practices and standards to mitigate cyber risks
I just add my cybersecurity projects that are focused on simplifying things for the public
Add a description, image, and links to the cybersecurity-awareness topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-awareness topic, visit your repo's landing page and select "manage topics."