TalEliyahu / awesome-cybersecurity-conferences
Watch the latest awesome security talks around the globe
☆262Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-cybersecurity-conferences
- API Security Project aims to present unique attack & defense methods in API Security field☆279Updated 2 years ago
- Websec interview questions by tib3rius answered☆304Updated last year
- ☆292Updated 3 months ago
- My last 12 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much mor…☆295Updated 11 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆381Updated 3 months ago
- Collection of Threat Models☆383Updated 2 years ago
- Awesome information for WebSockets security research☆252Updated 2 years ago
- ☆209Updated 2 years ago
- ☆136Updated 3 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆316Updated 3 weeks ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆391Updated 2 weeks ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆317Updated 11 months ago
- Black box fuzzer for web applications☆405Updated 4 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆228Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆252Updated 4 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆317Updated 9 months ago
- ☆217Updated last year
- ☆264Updated last month
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 10 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆97Updated 2 years ago
- ☆248Updated last year
- My public notes about offensive security☆148Updated 11 months ago
- Cyber Security Notes, Methodology, Resources and Tips☆123Updated this week
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆305Updated last month
- Red Team Guides☆134Updated 10 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆227Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆422Updated 4 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆378Updated last year
- ☆427Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆237Updated 2 years ago