kh4sh3i / DevSecOpsLinks
Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies
☆18Updated 2 years ago
Alternatives and similar repositories for DevSecOps
Users that are interested in DevSecOps are comparing it to the libraries listed below
Sorting:
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆27Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Write-Ups for TryHackMe☆21Updated 4 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 3 years ago
- ☆19Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆28Updated 2 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- ☆11Updated 4 years ago
- Wiki to collect Red Team infrastructure hardening resources☆30Updated 6 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Security cheat sheets for different language and platforms☆19Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆16Updated 6 years ago
- Penetration testing course by Z0F.☆52Updated 3 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 5 years ago
- ☆29Updated 3 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Virtual environment for learning DevSecOps☆34Updated 7 years ago
- A curated list of Docker resources and projects☆14Updated last year
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10Updated 6 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆20Updated 2 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆25Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Updated 5 years ago