TalEliyahu / awesome-cybersecurity-conferences
Watch the latest awesome security talks around the globe
☆272Updated last month
Alternatives and similar repositories for awesome-cybersecurity-conferences:
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below
- API Security Project aims to present unique attack & defense methods in API Security field☆283Updated 3 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆422Updated 3 weeks ago
- Websec interview questions by tib3rius answered☆307Updated last year
- ☆290Updated 7 months ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆331Updated 2 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆405Updated 2 months ago
- Awesome information for WebSockets security research☆261Updated 3 years ago
- Docker toolbox for pentest of web based application.☆148Updated this week
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆115Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆285Updated 11 months ago
- ☆218Updated 2 years ago
- ☆475Updated 10 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆258Updated last week
- ☆236Updated 2 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆332Updated last year
- Search for sensitive data in Postman public library.☆202Updated 2 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆121Updated 3 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated 2 weeks ago
- ☆707Updated 2 years ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆317Updated 2 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆325Updated 3 weeks ago
- DevSecOpsGuides☆187Updated last week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆243Updated 2 years ago
- Nuclei templates for honeypots detection.☆195Updated last year
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆271Updated last year
- ☆314Updated 8 months ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆250Updated 4 months ago
- A list of online news & info sources in the InfoSec/Cybersecurity space☆334Updated 7 months ago
- Recon MindMap (RMM)☆155Updated 10 months ago
- Cyber Security Notes, Methodology, Resources and Tips☆143Updated last week