Skip to content
View jclingensmith's full-sized avatar

Block or report jclingensmith

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

7 stars written in HTML
Clear filter

Curated list of Unix binaries that can be exploited to bypass system security restrictions

HTML 1 Updated Jan 25, 2019

These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.

HTML 1 Updated Dec 13, 2020

a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty

HTML 1 Updated Jun 2, 2021

Materials for workshops on information security for data analysts

HTML 1 Updated Dec 3, 2018

Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics

HTML 1 Updated May 1, 2020

Learn you a book for some infosec good

HTML 1 Updated Dec 5, 2019

Applied Purple Teaming - Infrastructure, Threat Optics, and Continious Improvement - June 6, 2020

HTML 1 Updated Jun 6, 2020