irgoncalves / awesome-security-articles
This repository contains links to awesome security articles.
☆36Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-security-articles
- BugBuntu Linux☆150Updated 3 years ago
- OpenCTI.BR ThreatFeeds Public Repository☆102Updated this week
- ☆39Updated 5 years ago
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆72Updated 5 months ago
- The most powerfull Web Content Scanner☆116Updated last year
- ☆49Updated 2 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Updated 2 years ago
- ☆40Updated 5 years ago
- The extension of Burp Suite for Conviso Platform aims to serve as an integration between them, making the life of an analyst easier, beca…☆36Updated 2 years ago
- Repository to put my notes related to OSCP certification☆24Updated 5 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆47Updated last year
- Brazilian OSINT Sources☆28Updated 11 months ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 6 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆48Updated 9 months ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- Script simples para análise de bytes para cabeçalhos IP e TCP/UDP de tamanho fixo de 20 bytes cada e também pacotes ARP☆13Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆42Updated last year
- Some of my presentations and published articles in different conferences☆18Updated 3 years ago
- Takeover AWS ips and have a working POC for Subdomain Takeover.☆89Updated 8 months ago
- CTF Write-ups☆19Updated 3 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- ☆26Updated 5 months ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- ☆71Updated 4 years ago
- ASN reconnaissance script☆124Updated 9 months ago
- Framework for rapid development of offensive security tools☆99Updated last week