Stars
Emulator for Software-Defined Wireless Networks
Free Images for EVE-NG and GNS3 containing routers, switches,Firewalls and other appliances, including Cisco, Fortigate, Palo Alto, Sophos and more. Master the art of networking and improve your sk…
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Historical documents (in Chinese) about the GPCR (Thanks Comrade RC MR HR etc.)
Mi resumen introductorio al lenguaje de programación Julia.
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …
Machine Learning for Cyber Security
Raspberry Pi Pico based receiver for 433 MHz weather sensors
This is the fully-functional GNU Radio software-defined radio (SDR) implementation of a LoRa transceiver with all the necessary receiver components to operate correctly even at very low SNRs. This …
Port TCC (Tiny C Compiler) to support Risc-V 32 targets (specifically for the ESP32-C3). This project is a work-in-progress and is not currently functional. The goal is to push developments to upst…
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Attempt at an oscilloscope application for the flipper zero. Measures voltage and frequency.
ClearURLs is an add-on based on the new WebExtensions technology and will automatically remove tracking elements from URLs to help protect your privacy.
SatIntel is an OSINT tool for Satellites 🛰. Extract satellite telemetry, receive orbital predictions, and parse TLEs 🔭
Guía para aprender Go desde lo más básico hasta lo más complejo
A curated list of awesome Lisp Machine and Lisp Operating System
Se presenta una introducción práctica a la Computación Cuántica usando el SDK Qiskit desarrollado por IBM en Python.
All about bug bounty (bypasses, payloads, and etc)
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
This MATLAB and Simulink Challenge Project Hub contains a list of research and design project ideas. These projects will help you gain practical experience and insight into technology trends and in…
Trojan Source: Invisible Vulnerabilities
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNE…
A thrust-vectoring model rocket flight computer. Comes with all you need to keep your rocket pointing up.