☆35Dec 10, 2020Updated 5 years ago
Alternatives and similar repositories for Security-Engineering-Training
Users that are interested in Security-Engineering-Training are comparing it to the libraries listed below
Sorting:
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Segment's Threat Modeling training for our engineers☆245May 4, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- ☆49Jan 20, 2026Updated last month
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆35Mar 8, 2022Updated 3 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆677Aug 7, 2020Updated 5 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- OWASP Foundation web repository☆15Oct 11, 2025Updated 4 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆42Updated this week
- Molecular beam experiment control code, and EDM data analysis software.☆10Updated this week
- Script to generate a combined PDF for the Security Engineering 3rd edition book from the publicly available chapters under review.☆36Nov 21, 2024Updated last year
- Class materials for our workshop series: Intro to JavaScript and Programming Fundamentals☆15Aug 25, 2018Updated 7 years ago
- 🍱 Food Bank Data Bank☆10Oct 18, 2016Updated 9 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- A curated list of awesome 🏧 hacking resources.☆16Dec 4, 2025Updated 2 months ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- ☆12Feb 10, 2026Updated 2 weeks ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 2 months ago
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- ☆10Jan 30, 2017Updated 9 years ago
- ☆15Nov 15, 2023Updated 2 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- A new tab Chrome extension that pulls quotes from The Creative Independent☆10Sep 25, 2022Updated 3 years ago
- AI Resilience Maturity Model☆25Aug 4, 2024Updated last year
- GitHub action to generate a CycloneDX SBOM for .NET☆12Jul 15, 2025Updated 7 months ago
- React Conf 2017: Cross-Platform Data Visualization in React & React Native☆13Mar 17, 2017Updated 8 years ago
- ☆34Jan 22, 2026Updated last month
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- ☆10Aug 9, 2024Updated last year
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- ☆13Dec 12, 2022Updated 3 years ago
- Experimenting with code every other Monday in OC 🔬☆12Aug 22, 2017Updated 8 years ago