hong6914 / awesome_software_securitiesLinks
Sites and URLs on software and securities that I hope to learn from you guys
☆43Updated 4 years ago
Alternatives and similar repositories for awesome_software_securities
Users that are interested in awesome_software_securities are comparing it to the libraries listed below
Sorting:
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Repo for the Gitbook Practical Hacking☆102Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆59Updated 10 months ago
- ☆69Updated 10 months ago
- Scripts for OSCE☆18Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Awesome Hacking☆20Updated 6 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆17Updated 6 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆16Updated 8 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- Simple Live Data Collection Tool☆22Updated 4 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated this week
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆34Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago