Infosec-Community / APAC-ConferencesLinks
A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
☆168Updated last month
Alternatives and similar repositories for APAC-Conferences
Users that are interested in APAC-Conferences are comparing it to the libraries listed below
Sorting:
- A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.☆68Updated 5 months ago
- materials we hand out☆146Updated 3 months ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆74Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- ☆123Updated last year
- Search exposed EBS volumes for secrets☆298Updated 2 years ago
- ☆23Updated 2 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆177Updated 2 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆209Updated 7 months ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 4 years ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆269Updated 8 months ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆282Updated 2 weeks ago
- Brian's Pentesting and Technical Tips for You☆120Updated 10 months ago
- Open source security career ladders☆115Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆521Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- ☆32Updated 4 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 5 years ago
- ☆251Updated last year
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆141Updated 3 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Updated 4 months ago