Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of these cheatsheets are to aid penetration testers/CTF participants/security enthusiasts in remembering commands that are useful, but not frequently used. Most of the tools that will be covered have been included in our class and are available in Kali Linux. Requirements: The only requirement to use these cheatsheets is for cheat to be installed. How to Use: In order to use these cheatsheets, the cheatsheets in this repository need to go into ~/.cheat/ directory. After the files are moved into that directory, cheat ncat will display the ncat cheatsheet. Contributors: Jose Moruno Cadima aka Snifer TWITTER BLOG Jason Soto aka Jsitech TWITTER BLOG GUTEM - GITHUB Original Contributors: Andrew Kerr (andrewjkerr), Angela Evans (angelaevans), Alex Bujduveanu (alexbujduveanu), Michael Christakos (truckiewow) Resources: Metasploit Cheat Sheet
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
A one-stop online resource for cybersecurity degree programs in the US, offering information on undergraduate and graduate levels, online programs, and career options.
A comprehensive guide to SSL/TLS vulnerabilities and vulnerable cipher suites.
A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.
One of the oldest hacker conventions in America, offering a unique and personal experience.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.