
Starred repositories
⭐️ A curated list of awesome forensic analysis tools and resources
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
Malware samples, analysis exercises and other interesting resources.
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
The SpecterOps project management and reporting engine
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
iOS is Apple's proprietary operating system that runs on the iPhone, iPod Touch and iPad. A lot of components are specific to iOS. Here are key features of the iOS hardware and software security ar…
List of questions, answers and random notes for security interviews
A curated list of awesome reversing resources
Learning and hunting SQL injection bugs for 50 continuous days
A curated awesome list of lists of interview questions. Feel free to contribute! 🎓
This is a curated list of resources about code reviews: articles, tools, trainings...
A complete computer science study plan to become a software engineer.
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Standard and Advanced Demos for learn.cantrill.io courses
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
A list of resources blogs talks material about DevSecOps
Checklist for container security - devsecops practices
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
Collection of Facebook Bug Bounty Writeups
List of Github repositories and articles with list of dorks for different search engines
A collection of awesome security hardening guides, tools and other resources