Jeffreyhung / CyberSecurityInterviewQuestions
Some Cyber Security related roles Interview Questions
☆10Updated 3 years ago
Alternatives and similar repositories for CyberSecurityInterviewQuestions:
Users that are interested in CyberSecurityInterviewQuestions are comparing it to the libraries listed below
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆11Updated 5 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last week
- Repo for Cybercloud Tutorials hosted at cybercloud.guru☆3Updated 6 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- List of questions, answers and random notes for security interviews☆69Updated 3 years ago
- A CALDERA plugin☆26Updated 8 months ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆30Updated 2 years ago
- Security Operation Center Lab☆18Updated 5 months ago
- ☆19Updated last year
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆20Updated 2 months ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 3 months ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆64Updated 5 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆9Updated 3 years ago
- Holds the public Hacking the Cloud CTFs.☆55Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆34Updated 2 years ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆11Updated 4 years ago
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- ☆15Updated 3 years ago