16 results for “topic:security-labs”
Code from exercises and labs on TryHackMe. TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs on the browser!
Personal cybersecurity lab documenting hands-on exepriments, vulnerabilities analysis and exploitation in controlled environments(CTFs, DVWA, custom tools).
Vulnerable dockerized environment designed to test OAuth vulnerabilities
Master cybersecurity fundamentals through hands-on labs, covering threat analysis, risk management, network security, identity management, cryptography, and incident response. Perfect for CompTIA Security+ certification prep.
Hands-on cloud and Linux security labs focused on secure server configuration, IAM, and cloud fundamentals.
Write-ups and walkthroughs of vulnerable labs (THM, HTB, custom VMs)
Here in this entire repository you will learn the entire process step by step
Repository containing lab exercises and practical activities from the Master's Degree course in Computer Security at UNIMORE.
Offensive security workspace focused on mobile, web, and red team labs.
Hands-on cybersecurity analysis projects focused on network security, reconnaissance, and threat analysis.
Hands-on cybersecurity labs, CTF write-ups, and TryHackMe training notes documenting investigation methods, defensive security concepts, and analytical techniques.
Comprehensive AWS Security Incident Response repository including notes, hands-on labs, incident response playbooks, workshops, case studies, and certificate of completion. Learn cloud security, threat detection, containment, and recovery in AWS environments.
A Simple C program showing a buffer overflow vulnerability
A collection of real-world IDOR security labs highlighting broken access control and object-level authorization failures.
A growing collection of structured TryHackMe walkthroughs as I train for SOC Analyst roles. Focused on enumeration, exploitation, and blue team techniques aligned with the SOC Level 1 path.
Hands-on cybersecurity lab projects including vulnerability assessment, network traffic analysis, and network discovery using Kali Linux.