Jeffreyhung / CyberSecurityInterviewQuestions
Some Cyber Security related roles Interview Questions
☆11Updated 4 years ago
Alternatives and similar repositories for CyberSecurityInterviewQuestions
Users that are interested in CyberSecurityInterviewQuestions are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- Repo for Cybercloud Tutorials hosted at cybercloud.guru☆3Updated 8 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Security Operation Center Lab☆19Updated 7 months ago
- ☆56Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆31Updated 2 years ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- ☆16Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated this week
- A CALDERA plugin☆26Updated 9 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last month
- A meta-database collecting resources that compile lists of breaches☆18Updated 6 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated last year
- ☆11Updated 4 years ago
- FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, lear…☆42Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- ☆41Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆46Updated this week
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated last year