Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View yumingyuan2018's full-sized avatar

Block or report yumingyuan2018

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

《Hello 算法》:动画图解、一键运行的数据结构与算法教程。支持 Python, Java, C++, C, C#, JS, Go, Swift, Rust, Ruby, Kotlin, TS, Dart 代码。简体版和繁体版同步更新,English version in translation

Java 118,242 14,516 Updated Oct 30, 2025

21 Lessons, Get Started Building with Generative AI

Jupyter Notebook 101,390 53,792 Updated Nov 3, 2025

经济学人(含音频)、纽约客、卫报、连线、大西洋月刊等英语杂志免费下载,支持epub、mobi、pdf格式, 每周更新

CSS 26,482 2,121 Updated Nov 1, 2025

The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)

PowerShell 264 36 Updated Feb 3, 2022

The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the pro…

264 33 Updated Feb 2, 2021

抢救中文人文讲座,建立人文讲座列表

52 9 Updated Jan 29, 2023

This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them

8,444 1,649 Updated Jun 22, 2025

This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."

707 123 Updated Jun 24, 2025

This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".

2,409 495 Updated Nov 16, 2024

Code included as part of the MustLearnKQL blog series

1,109 187 Updated Oct 6, 2025

PowerShell Digital Forensics & Incident Response Scripts.

PowerShell 712 104 Updated Oct 4, 2025

This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.

Python 717 75 Updated Jan 28, 2025

All the deals for InfoSec related software/tools this Black Friday

3,866 437 Updated Nov 29, 2024

Interesting APT Report Collection And Some Special IOCs

Python 2,696 536 Updated Nov 5, 2025

Serverless plugin for least privileges.

JavaScript 250 11 Updated Aug 22, 2021

Automation to assess the state of your M365 tenant against CISA's baselines

PowerShell 2,340 328 Updated Nov 5, 2025

Documentation and scripts to properly enable Windows event logs.

Batchfile 639 57 Updated Oct 3, 2025

立党零基础转码笔记

TypeScript 5,757 361 Updated May 5, 2024

List of Awesome Red Teaming Resources

7,572 1,719 Updated Dec 28, 2023

A complete computer science study plan to become a software engineer.

332,516 81,123 Updated Aug 28, 2025

Rapidly Search and Hunt through Windows Forensic Artefacts

Rust 3,352 293 Updated Oct 12, 2025

Collection of Jupyter Notebooks by @fr0gger_

HTML 182 41 Updated Oct 4, 2025

This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.

PowerShell 2,403 353 Updated Oct 16, 2025

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1,577 302 Updated Nov 4, 2025

The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Product Group in conjunction with the Microsoft Detection and Resp…

PowerShell 450 49 Updated Jun 16, 2023

List of Computer Science courses with video lectures.

70,131 9,423 Updated Nov 2, 2025

A collection of awesome security hardening guides, tools and other resources

5,982 612 Updated Oct 2, 2024

Transform Linux Audit logs for SIEM usage

Rust 802 62 Updated Sep 22, 2025
Next