captn3m0 / security-engineering-ebook
Script to generate a combined PDF for the Security Engineering 3rd edition book from the publicly available chapters under review.
☆35Updated 2 months ago
Alternatives and similar repositories for security-engineering-ebook:
Users that are interested in security-engineering-ebook are comparing it to the libraries listed below
- A tool to spider Github or search URLs for various information leaks☆33Updated last year
- Only the best quality InfoSec-resources shared, based on regular sourcing of publicly available content found on the internet.☆147Updated 4 years ago
- This is the network diagrams, configuration guides, and hardware used for my home lab.☆77Updated 6 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆16Updated 6 years ago
- ☆21Updated 3 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆30Updated 2 years ago
- USA based Information Security & I.T. Conferences☆33Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Cracking the Security Engineer Interviews☆52Updated 2 years ago
- ☆15Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- ☆10Updated last year
- Sites and URLs on software and securities that I hope to learn from you guys☆40Updated 4 years ago
- ☆11Updated 5 years ago
- A simple powershell script which gives handy compliance report.☆18Updated 7 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆30Updated 8 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- All checklists☆26Updated 5 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆39Updated 8 months ago
- This repo contains workshop material delivered at #nullcon2020☆15Updated 4 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Updated 4 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Bash Enumeration Script☆18Updated 5 years ago
- Awesome Hacking☆20Updated 6 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆59Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago