Training and certifications related to secure software development
☆11Feb 9, 2026Updated last month
Alternatives and similar repositories for AppSec-Training
Users that are interested in AppSec-Training are comparing it to the libraries listed below
Sorting:
- ☆10May 6, 2017Updated 8 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- Bot for the pyslackers slack☆16Feb 15, 2021Updated 5 years ago
- My cyber security notes.☆14Feb 22, 2025Updated last year
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Репозиторий, содержащий решения тасков и описание инцидента - RedShift190☆10Dec 26, 2023Updated 2 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆44Aug 13, 2025Updated 6 months ago
- PoC of using Directus as ASPM☆12May 31, 2024Updated last year
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Aug 9, 2023Updated 2 years ago
- Complete solution for intentionally vulnerable webshop: "Juice Shop"☆97Feb 18, 2016Updated 10 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Celery plugin to autoscale based on available CPU, memory, or other system attributes.☆11Dec 8, 2017Updated 8 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- TP-Framework: Testability Pattern Framework for SAST☆15May 10, 2024Updated last year
- ☆10Sep 19, 2022Updated 3 years ago
- A mesh system for adapting multiple large language models.☆11Mar 20, 2024Updated last year
- AIChat:集成ChatGPT、Midjourney、文心一言、DALL.E2。多支付和充值方式。多推广方式。多广告位。自定义会员套餐。流式响应。多种安全控制。源码版支持二开。教程完善。免费升级。联系:xiaoluobu7☆10Sep 6, 2023Updated 2 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- ☆11Jan 24, 2023Updated 3 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago