TalEliyahu / awesome-cybersecurity-conferences
Watch the latest awesome security talks around the globe
☆274Updated 2 months ago
Alternatives and similar repositories for awesome-cybersecurity-conferences:
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
- Websec interview questions by tib3rius answered☆307Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆428Updated last month
- ☆291Updated 8 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆284Updated 3 years ago
- Awesome information for WebSockets security research☆267Updated 3 years ago
- Docker toolbox for pentest of web based application.☆150Updated this week
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆337Updated 3 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆327Updated last month
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated last month
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆123Updated 4 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆250Updated 5 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆286Updated last year
- ☆425Updated 8 months ago
- ☆239Updated 3 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆408Updated 3 months ago
- A OWASP Based Checklist With 80+ Test Cases☆142Updated 2 years ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆189Updated 2 years ago
- ☆481Updated 11 months ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆388Updated 6 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆118Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆480Updated 9 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆318Updated 3 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last week
- ☆223Updated 2 years ago
- Red Team Attack Lab for TTP testing & research☆566Updated last year
- Repository of Bug-Bounty Writeups☆302Updated last week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆632Updated last year
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆237Updated 4 years ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year