jacobian / infosec-engineering
A reading list for infosec engineers
☆536Updated 6 years ago
Alternatives and similar repositories for infosec-engineering:
Users that are interested in infosec-engineering are comparing it to the libraries listed below
- Vulnerable Django Application☆203Updated 3 years ago
- A deliberately-vulnerable website and exercises for teaching about the OWASP Top 10☆186Updated 8 months ago
- Scripts built from our Guide to User Data Security☆444Updated 7 months ago
- A curated list of computer science literature, updated daily.☆164Updated 9 years ago
- Live at http://extractdata.club☆167Updated 8 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- List of crypto projects that might not suck☆424Updated 2 years ago
- A stupid game for learning about containers, capabilities, and syscalls.☆899Updated last year
- OpenDNS application security training program☆228Updated 3 years ago
- Collection of Ansible playbooks to quickly start your Django Application☆339Updated 8 years ago
- Teach you a binary exploitation for great good.☆292Updated 6 years ago
- Your best is an idiot☆138Updated 8 years ago
- Achieving confident refactoring through experimentation with Python 2.7 & 3.3+☆1,272Updated last year
- Educational SSH client☆123Updated 8 years ago
- A realistic password strength estimator.☆254Updated 3 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Sandboxed Execution Environment☆819Updated 4 years ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆275Updated 9 years ago
- Programming challenges for Hackers - A command line tool for all programming challenges☆289Updated 5 years ago
- Scan domains and return data based on HTTPS best practices☆678Updated last month
- Book Recommendations for the Infrastructure Engineer ;)☆925Updated 3 years ago
- Conference Talks and Proposals☆752Updated 7 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆516Updated 6 years ago
- Distributed alerting for the masses!☆995Updated 6 years ago
- pre-commit hook for Git that checks for suspicious files.☆328Updated 8 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- Deployment checklist for securely deploying Docker☆604Updated 8 years ago
- A book to help software developers write better prose☆227Updated last year
- A tool to surface security issues in python code☆226Updated 7 years ago
- Luke Gorrie's blog☆565Updated last year