null-open-security-community / DocumentationLinks
Single Repository to keep policy and simmilar documentation
☆35Updated 6 months ago
Alternatives and similar repositories for Documentation
Users that are interested in Documentation are comparing it to the libraries listed below
Sorting:
- ☆71Updated 4 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- Sharing Various Things☆22Updated 3 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆73Updated 4 months ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Updated 4 years ago
- Detectify Crowdsource Challenge☆69Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆188Updated 3 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆43Updated last year
- ☆17Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆181Updated 2 years ago
- ☆18Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆147Updated 4 years ago
- Damn Vulnerable Cloud Application☆197Updated 6 years ago
- Penetration Testing Checklist☆36Updated 5 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- ☆22Updated 4 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆135Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 5 years ago
- ☆83Updated 2 years ago