Pinned Repositories
100-days-of-code
Fork this template for the 100 days journal - to keep yourself accountable (multiple languages available)
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-infosec
A curated list of awesome infosec courses and training resources.
awesome-osint
:scream: A curated list of amazingly awesome OSINT
binjitsu
CTF framework and exploit development library
cmd-command-cheat-sheet
CMD - Command Cheat Sheat ✅
computer-science
:mortar_board: Path to a free self-taught education in Computer Science!
eudyptula
www.eudyptula-challenge.org
Network-Intrusion-Detection-System
Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R. Java is used to prepare DataSets. R is used implement a neural network. Weka is used for data cleaning.
write-ups-2017
Wiki-like CTF write-ups repository, maintained by the community. 2017
jeshrelcyril's Repositories
jeshrelcyril/binjitsu
CTF framework and exploit development library
jeshrelcyril/cmd-command-cheat-sheet
CMD - Command Cheat Sheat ✅
jeshrelcyril/computer-science
:mortar_board: Path to a free self-taught education in Computer Science!
jeshrelcyril/eudyptula
www.eudyptula-challenge.org
jeshrelcyril/Network-Intrusion-Detection-System
Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R. Java is used to prepare DataSets. R is used implement a neural network. Weka is used for data cleaning.
jeshrelcyril/write-ups-2017
Wiki-like CTF write-ups repository, maintained by the community. 2017
jeshrelcyril/100-days-of-code
Fork this template for the 100 days journal - to keep yourself accountable (multiple languages available)
jeshrelcyril/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
jeshrelcyril/awesome-infosec
A curated list of awesome infosec courses and training resources.
jeshrelcyril/awesome-osint
:scream: A curated list of amazingly awesome OSINT
jeshrelcyril/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
jeshrelcyril/challenges.re
challenges.re website
jeshrelcyril/Cybersecurity-Resources
A Library of various cybersecurity resources
jeshrelcyril/dorian
Will write one once i do one!
jeshrelcyril/github-for-developers-7
jeshrelcyril/OSCP-Prep
A list of the resources I use as I get ready for the exam
jeshrelcyril/OSCP-Survival-Guide
Kali Linux Offensive Security Certified Professional Survival Exam Guide
jeshrelcyril/oscp_practice
oscp study
jeshrelcyril/Penetration-Testing-Mind-Map
To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.
jeshrelcyril/proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
jeshrelcyril/resources
A general collection of information, tools, and tips regarding CTFs and similar security competitions
jeshrelcyril/security-onion
Linux distro for intrusion detection, enterprise security monitoring, and log management
jeshrelcyril/simple-bash-scripts
A collection of simple Bash scripts
jeshrelcyril/write-ups-2015
Wiki-like CTF write-ups repository, maintained by the community. 2015
jeshrelcyril/write-ups-2016
Wiki-like CTF write-ups repository, maintained by the community. 2016
jeshrelcyril/write-ups-tools
A collection of tools used to maintain and create CTF write-up folders