mchow01 / VulnerableVoterDatabaseLinks
A deliberately insecure voter database
☆33Updated 3 months ago
Alternatives and similar repositories for VulnerableVoterDatabase
Users that are interested in VulnerableVoterDatabase are comparing it to the libraries listed below
Sorting:
- Hands-on Security Automation in DevOps, published by Packt☆52Updated 2 years ago
- ☆41Updated 4 years ago
- Hands-On AWS Penetration Testing with Kali Linux published by Packt☆135Updated 3 years ago
- AWS Penetration Testing, published by Packt☆33Updated 3 years ago
- Packet analysis exercises☆45Updated 4 months ago
- ☆15Updated 3 years ago
- Collection of links to Security stuff☆117Updated 4 months ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Salesforce object access auditor☆117Updated 2 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆26Updated 3 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆68Updated 3 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆76Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- An ongoing list of virtual cybersecurity conferences.☆121Updated 4 years ago
- Vulnerable Task Manager☆20Updated last year
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 4 years ago
- ☆24Updated 5 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- Security conferences talks☆25Updated 5 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆89Updated 6 years ago
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- A repo to support the book☆46Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- DEFCON 30 Mainframe buffer overlow workshop container☆92Updated last year
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 3 years ago
- ☆70Updated 2 years ago
- 📚A curated list of product security resources.☆22Updated 7 months ago