mchow01 / VulnerableVoterDatabase
A deliberately insecure voter database
☆31Updated this week
Related projects ⓘ
Alternatives and complementary repositories for VulnerableVoterDatabase
- Hands-on Security Automation in DevOps, published by Packt☆47Updated last year
- ☆15Updated 2 years ago
- ☆41Updated 2 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆55Updated 11 months ago
- AWS Penetration Testing, published by Packt☆30Updated last year
- Virtual Security Operations Center☆49Updated last year
- ☆11Updated last year
- Purple Team Strategies, Published by Packt☆11Updated last year
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- ☆24Updated 3 years ago
- This repo contains workshop material delivered at #nullcon2020☆15Updated 4 years ago
- Security conferences talks☆25Updated 4 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Updated last year
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆8Updated 3 years ago
- A repo to support the book☆40Updated last year
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 3 years ago
- ☆18Updated 2 years ago
- This repository is created for TechCommanders and O'Reilly Students who have taken the Google Cloud Professional Security Engineer Crash …☆15Updated 3 years ago
- ☆37Updated 7 months ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆13Updated 4 years ago
- Packet analysis exercises☆41Updated 3 years ago
- Material from presentations done by GoSecure researchers☆33Updated last year
- Jekyll Files for cloudsecwiki.com☆49Updated 3 years ago
- Code Repository for CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019, published by Packt☆10Updated last year
- AWS Incident Response Kit (AIRK) - AWS Incident Response☆21Updated 4 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- 📚A curated list of product security resources.☆18Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 3 months ago