kh4sh3i / DevSecOps
Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies
☆18Updated 2 years ago
Alternatives and similar repositories for DevSecOps
Users that are interested in DevSecOps are comparing it to the libraries listed below
Sorting:
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Write-Ups for TryHackMe☆22Updated 3 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆38Updated last year
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆27Updated 2 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Updated 5 years ago
- ☆11Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆58Updated 3 months ago
- Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (…☆29Updated 4 years ago
- ☆29Updated 3 years ago
- ☆19Updated 3 years ago
- Web application pentesting recon☆23Updated 4 years ago
- AWS Penetration Testing, published by Packt☆29Updated 2 years ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆44Updated 2 years ago
- IoT Hacking Kit Details☆18Updated 7 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- Recon Automation for BugBounties☆11Updated 8 months ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- SSH brute-force script created for HackTheBox☆16Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆15Updated 3 years ago
- Learning-Pentesting-With-Python☆21Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆29Updated 6 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆54Updated last year
- Resource Dump For Learning Cybersec-related Concepts☆24Updated 4 years ago
- Public Exploits☆10Updated 4 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆9Updated 3 years ago
- ☆13Updated 5 years ago