abhaybhargav / Security_Engineer_Interview_QuestionsLinks
Every Security Engineer Interview Question From Glassdoor.com
☆24Updated 7 years ago
Alternatives and similar repositories for Security_Engineer_Interview_Questions
Users that are interested in Security_Engineer_Interview_Questions are comparing it to the libraries listed below
Sorting:
- A tool geared towards pentesting APIs using OpenAPI definitions.☆179Updated 2 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆172Updated 6 years ago
- Uncover forgotten secrets and bring them back to life, haunting security and operations teams.☆208Updated 2 years ago
- GraphQL security testing tool☆123Updated 3 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- a Damn Vulnerable Serverless Application☆541Updated last year
- Research on GraphQL from an AppSec point of view.☆416Updated 2 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆530Updated 2 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- GraphQL security workshop labs☆113Updated 2 weeks ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆81Updated 2 years ago
- Curated list of public penetration testing reports released by several consulting firms☆48Updated 7 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆354Updated 4 years ago
- These are the regexes that power truffleHog☆217Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆318Updated last year
- Damn Vulnerable Java (EE) Application☆140Updated last year
- materials we hand out☆147Updated 3 weeks ago
- A collection of useful Serverless functions I use when pentesting☆388Updated 2 years ago
- A simple SSRF-testing sheriff written in Go☆329Updated 9 months ago
- ☆276Updated 3 years ago
- A Bind9 server for pentesters to use for Out-of-Band vulnerabilities☆192Updated 5 years ago
- Web Application Security Checklist☆131Updated 4 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆390Updated 5 years ago
- Check any website (or set of websites) for insecure security headers.☆252Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆203Updated 2 years ago