Stars
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
๐ Because Education should be free. Contributions welcome! ๐ต๏ธ
๐ฉโ๐ป๐จโ๐ป Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should know in one single file.
The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.
A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
Python API wrapper for haveibeenpwned.com (API v3)
Pillage filesystems for sensitive information with Go ๐
List of projects that provide terminal user interfaces
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
IntelOwl: manage your Threat Intelligence at scale
๐พ dn - offline full-text search and archiving for your Chromium-based browser.
Remote shell into ephemeral environments ๐ ๐ฆ
Awesome list about all kinds of interesting topics: Laws, Principles, Mental Models, Cognitive Biases
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
โญ๏ธ Companies that don't have a broken hiring process
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
PoC exploit of CVE-2020-11651 and CVE-2020-11652
Principles to help you design and deploy a zero trust architecture