TalEliyahu / awesome-cybersecurity-conferencesLinks
Watch the latest awesome security talks around the globe
☆278Updated 6 months ago
Alternatives and similar repositories for awesome-cybersecurity-conferences
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
Sorting:
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆166Updated last year
- Awesome information for WebSockets security research☆276Updated 3 years ago
- Websec interview questions by tib3rius answered☆311Updated last year
- Docker toolbox for pentest of web based application.☆165Updated last week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated 5 months ago
- ☆314Updated last month
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆265Updated 3 weeks ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆300Updated 2 weeks ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- ☆432Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆451Updated 2 months ago
- A list of bookmarks I have used since I started my journey in cyber security☆286Updated 2 years ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆191Updated 2 years ago
- ☆234Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- ☆241Updated 7 months ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆280Updated last year
- ☆82Updated 2 years ago
- My public notes about offensive security☆164Updated last year
- ☆279Updated 2 years ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆368Updated 2 months ago
- Tools to assess DNS security.☆152Updated last year
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆426Updated 10 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- A OWASP Based Checklist With 80+ Test Cases☆153Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆426Updated 7 months ago
- ☆314Updated last year