Infosec-Community / APAC-MeetupsLinks
A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
☆68Updated 4 months ago
Alternatives and similar repositories for APAC-Meetups
Users that are interested in APAC-Meetups are comparing it to the libraries listed below
Sorting:
- A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.☆168Updated last month
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆74Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- ☆50Updated 2 years ago
- Amazon bucket brute force tool☆101Updated 11 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Curated list of public penetration testing reports released by several consulting firms☆48Updated 7 years ago
- A list of information security companies that offer penetration testing services and/or other offensive red side orientated services at a…☆17Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Resource for developing infosec skills for OSCP☆115Updated 11 months ago
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- materials we hand out☆145Updated 2 months ago
- ☆32Updated 4 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆92Updated last year
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Open source security career ladders☆115Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Containerized version of my fork of Nahamsec's Lazyrecon.☆49Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- Web application to create indexes for GIAC certification examinations.☆142Updated 2 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆172Updated 6 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago