kh4sh3i / DevSecOps
Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DevSecOps
- Dockerfile with advanced configurations for Offensive Docker.☆12Updated 4 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆24Updated last year
- A list of universities with vulnerability disclosure policies☆11Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆8Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Updated 5 years ago
- AWS Penetration Testing, published by Packt☆30Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- ☆13Updated 4 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆26Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- Are you able to use open source intelligence to solve this challenge?☆10Updated 5 years ago
- Write-Ups for TryHackMe☆22Updated 3 years ago
- hacking tools awesome lists☆14Updated 7 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆26Updated 5 years ago
- Intelligence gathering framework☆13Updated 9 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆17Updated last year
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆17Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- A formula to calculate bounty amounts.☆13Updated 6 years ago
- Just a bunch of useful scripts for netsec/admin/others☆14Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆26Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Penetration testing course by Z0F.☆52Updated 3 years ago
- Code to check AWS S3 buckets☆16Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆27Updated 8 years ago
- IoT Hacking Kit Details☆17Updated last month
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago