cybersecurity-resources
robot_hacking_manual
Our great sponsors
cybersecurity-resources | robot_hacking_manual | |
---|---|---|
1 | 12 | |
155 | 282 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | about 1 year ago | |
Jupyter Notebook | TeX | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cybersecurity-resources
-
Cyber Security Roadmap - Follow or Not?
I would also add https://github.com/alex-bellon/cybersecurity-resources as a useful source of scatterd infos and courses
robot_hacking_manual
- Robot Hacking Manual (RHM) v0.5, an introductory series about cybersecurity for robots
- Robot hacks, robot vulnerabilities and attacks due to cybersecurity issues
- Robot Hacking Manual (RHM) v0.4
- Robot Hacking Manual (RHM) v0.4. From robotics to cybersecurity
-
Robot Hacking Manual (RHM)
For those willing to contribute, please do so by sending PRs to https://github.com/vmayoral/robot_hacking_manual. Credit will be acknowledged appropriately.
- Robot Hacking Manual (RHM). Papers, notes and writeups from a journey into robot cybersecurity.
- Robot Hacking Manual (RHM). From robotics to cybersecurity
What are some alternatives?
HackThisAI - Adversarial Machine Learning (AML) Capture the Flag (CTF)
MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics
Azure-Sentinel - Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
be-a-hacker - roadmap for a self-taught hacker
Lucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
webots - Webots Robot Simulator
logkeys - :memo: :keyboard: A GNU/Linux keylogger that works!
WiFi-Project - Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
sans-indexes - Indexes for SANS Courses and GIAC Certifications
coarray-tutorial - A short tutorial to get people started with Fortran's coolest feature, coarrays.