🕹️ Create an engaging 2.5D game that challenges players with unique puzzles and immersive gameplay, fostering creativity and strategic thinking.
-
Updated
Dec 16, 2025 - Kotlin
🕹️ Create an engaging 2.5D game that challenges players with unique puzzles and immersive gameplay, fostering creativity and strategic thinking.
🔍 Build a robust Security Operations Center (SOC) with this comprehensive blueprint, featuring Splunk SIEM, automation, and enterprise-level security monitoring.
Security Engineer - Cybersecurity Enthusiast - Open Source and Privacy Advocate
Check your password strength and estimated crack time (brute-force). 🔐 The website runs entirely in your browser (client-side) and the Python script is 100% offline. Zero data sent to servers, everything stays on your machine. 🚀
Website for HackOn, a Spanish cybersecurity conference.
a gamified cybersecurity learning platform for Cybersecurity Fundamentals. A Thesis Study of DevInnovate. Empower your classroom with interactive tasks, real-time progress tracking, and a leaderboard that sparks friendly competition.
Locking Down Networks, Unlocking Confidence - Security | Networking | Privacy
Kudo - Framework de Ciberseguridad
SocEng Lab is an open-source adaptive social engineering simulation platform that brings academic rigor to security awareness training.
Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effectiveness of physical security controls.
Active Directory Auditing and Enumeration
A running list of real-life situations that show why privacy is the foundation of our lives.
An intelligent web tool that uses the power of Google Gemini and OpenAI's ChatGPT to analyze URLs and detect phishing risks in real-time.
Public organization profile for Network Pro Strategies
Static webpage for the beginning of a long journey ahead.
Exploring vulnerabilities within browser databases, network data, and other various information to simulate how malware/spyware performs credential extraction and collects crucial data undetected. Made after my freshmen year of high school, July 2022. For educational and research purposes only :)
All the Programs of the 7th Sem Cyber Security Lab with their output in different steps. This lab provides students with hands-on experience in implementing and understanding fundamental cybersecurity concepts. It focuses on practical exposure to key security areas such as cryptography, network security, vulnerability assessment, secure code.
The official blog of Network Pro Strategies (Network Pro™)
Discussions | Network Pro
A basic bruteforce attack simulation, contains the weak code which has a weak login system and my task is to fix the login system. There will be two files one is a weak security code and the one i will update and improve the secuurity of the login system
Add a description, image, and links to the cybersecurity-awareness topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-awareness topic, visit your repo's landing page and select "manage topics."