TalEliyahu / awesome-cybersecurity-conferencesLinks
Watch the latest awesome security talks around the globe
☆275Updated 3 months ago
Alternatives and similar repositories for awesome-cybersecurity-conferences
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
Sorting:
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- Awesome information for WebSockets security research☆272Updated 3 years ago
- Websec interview questions by tib3rius answered☆309Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 2 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆431Updated 3 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆119Updated 3 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆350Updated 5 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆333Updated 3 months ago
- ☆293Updated 10 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆417Updated 4 months ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆252Updated 7 months ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆402Updated 7 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- Docker toolbox for pentest of web based application.☆152Updated this week
- ☆425Updated 9 months ago
- ☆226Updated 2 years ago
- ☆241Updated 4 months ago
- Red Team Attack Lab for TTP testing & research☆572Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last month
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆292Updated last year
- Secrets scanner that understands code☆190Updated last year
- A list of online news & info sources in the InfoSec/Cybersecurity space☆344Updated last month
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Updated 2 years ago
- My public notes about offensive security☆155Updated last year
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆274Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆227Updated 4 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated last year
- Repository of Bug-Bounty Writeups☆304Updated 3 weeks ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆159Updated 6 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆163Updated 2 years ago