TalEliyahu / awesome-cybersecurity-conferencesLinks
Watch the latest awesome security talks around the globe
☆277Updated 10 months ago
Alternatives and similar repositories for awesome-cybersecurity-conferences
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
Sorting:
- API Security Project aims to present unique attack & defense methods in API Security field☆287Updated 3 years ago
- Awesome information for WebSockets security research☆296Updated 4 years ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆164Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆474Updated 7 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆126Updated 4 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆138Updated 3 years ago
- ☆314Updated 6 months ago
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- Docker toolbox for pentest of web based application.☆173Updated this week
- My public notes about offensive security☆166Updated 4 months ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆193Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 4 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆315Updated 5 months ago
- ☆246Updated 3 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Updated 4 months ago
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆76Updated 3 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆275Updated this week
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆101Updated last year
- Cybersecurity Notes☆167Updated last year
- ☆81Updated 2 years ago
- Awesome list for cloud security related projects☆143Updated 3 years ago
- OSCP Privilege Escalation MindMap/Guide☆197Updated 3 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆167Updated 2 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Updated 5 years ago
- Tools & Resources for Cyber Security Operations☆266Updated 7 months ago
- ☆243Updated 11 months ago
- List of questions, answers and random notes for security interviews☆72Updated 4 years ago
- Application Security pipelines☆51Updated 3 years ago
- ☆317Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆436Updated 2 weeks ago