Penetration Testing Interview Questions
☆53Apr 15, 2022Updated 3 years ago
Alternatives and similar repositories for Penetration-Testing-Interview-Questions
Users that are interested in Penetration-Testing-Interview-Questions are comparing it to the libraries listed below
Sorting:
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Penetration Testing and Offensive Security Interview Questions☆174May 17, 2022Updated 3 years ago
- ☆110Jun 2, 2020Updated 5 years ago
- 🔴 Web Security Interview Questions and Answered to prepare for your next Web Developer interview☆70Jan 24, 2020Updated 6 years ago
- Common Security Interview Questions with Answers☆31Jul 4, 2023Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆20Nov 13, 2025Updated 4 months ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Interview fo…☆66Mar 7, 2022Updated 4 years ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆65Mar 21, 2020Updated 6 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆138Feb 25, 2023Updated 3 years ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- A module to help you understand the std::containers in CPP (Darija)☆29Feb 2, 2024Updated 2 years ago
- List of questions, answers and random notes for security interviews☆72May 7, 2021Updated 4 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Real Cyber Security Interview Questions for Various Job Roles☆60May 21, 2022Updated 3 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- This repository stores various roadmap(Mindmaps) for bug bounty Hunter, pentester, offensive(red team), defensive(blue team) and security…☆58May 11, 2022Updated 3 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- ☆49Jul 8, 2025Updated 8 months ago
- This lab demonstrates some of the security concerns of a default Kubernetes Engine cluster configuration and the corresponding hardening …☆17Jul 29, 2019Updated 6 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Mar 13, 2023Updated 3 years ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- ☆12Jul 6, 2019Updated 6 years ago
- ☆26Oct 23, 2022Updated 3 years ago
- FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, lear…☆95Sep 20, 2022Updated 3 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- zwatcher is a lightweight bash script for monitoring sub/domains or a list of sub/domains and javascript files. It compares HTTP status c…☆21Nov 23, 2025Updated 3 months ago
- ☆11Jun 25, 2017Updated 8 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆436Dec 28, 2024Updated last year
- ☆24Oct 12, 2021Updated 4 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆889Mar 6, 2019Updated 7 years ago
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆26May 23, 2024Updated last year
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆14May 5, 2025Updated 10 months ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last month
- XShop's Documentation (High-level design, user stories, wireframes, mindmaps, and project's manual)☆10Mar 29, 2021Updated 4 years ago