Tuanp703 / Presentations-and-Papers
Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics
☆8Updated 2 years ago
Related projects: ⓘ
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆28Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆24Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆20Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated last month
- A learning and testing environment for web application hacking and pentesting.☆23Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Updated 2 years ago
- A summary of the most abbreviations I encountered so far☆13Updated this week
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 3 years ago
- ☆11Updated 2 years ago
- scripts & notes☆10Updated 4 years ago
- ☆14Updated last year
- ☆30Updated this week
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- ☆8Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆15Updated last year
- New Framework Red Team Operations☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆32Updated last year
- Simple recon tool automates your recon process☆15Updated last year
- King of Bug Bounty Tips Simple Tool☆10Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆9Updated last year
- Offensive Security Wireless Professional☆17Updated 4 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆9Updated 2 years ago
- Burp Suite Extensions☆12Updated 2 years ago
- Workflow for pentesting web applications.☆21Updated 5 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆11Updated 2 years ago
- Xss payload for bypassing waf☆13Updated 4 years ago