Code Monkey home page Code Monkey logo

orhaniscan's Projects

30-days-of-python icon 30-days-of-python

30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw

30-days-of-python-exercises icon 30-days-of-python-exercises

Solutions to the exercises in 30-days-of-python repo | Python Coding Exercises Solutions | Python exercise repository | Python Solutions | Python Learning | Python Practice Exercises and Solutions

agent icon agent

An open and scalable video surveillance system for anyone making this world a better and more peaceful place.

aptsimulator icon aptsimulator

A toolset to make a system look as if it was the victim of an APT attack

attack-navigator icon attack-navigator

Web app that provides basic navigation and annotation of ATT&CK matrices

awesome-cyber-security icon awesome-cyber-security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

awesome-security icon awesome-security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

awesome-soc icon awesome-soc

A collection of sources of documentation, as well as field best practices, to build/run a SOC

azure-sdk-for-net icon azure-sdk-for-net

This repository is for active development of the Azure SDK for .NET. For consumers of the SDK we recommend visiting our public developer docs at https://learn.microsoft.com/dotnet/azure/ or our versioned developer docs at https://azure.github.io/azure-sdk-for-net.

azure-sentinel icon azure-sentinel

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

cve_prioritizer icon cve_prioritizer

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.

cyber-kill-chain icon cyber-kill-chain

An overview of the Lockheed Martin Cyber Kill Chain, a framework that models the stages that an attacker may go through to achieve a successful cyber attack.

cybersec-handbook icon cybersec-handbook

A collection of all useful commands and tips related to different tools and domains of cyber.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.