nybble04 / cybersec-notesView external linksLinks
My cyber security notes.
☆14Feb 22, 2025Updated 11 months ago
Alternatives and similar repositories for cybersec-notes
Users that are interested in cybersec-notes are comparing it to the libraries listed below
Sorting:
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 6 months ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- ☆22Aug 9, 2025Updated 6 months ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- Collection's of Tech Talk that are presented by me :)☆101Jan 12, 2025Updated last year
- Want to become an Application Security Engineer? Here's a roadmap to help you get there.☆32Sep 3, 2022Updated 3 years ago
- 🔴 Web Security Interview Questions and Answered to prepare for your next Web Developer interview☆69Jan 24, 2020Updated 6 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- The Secure Coding Practices Quick-reference Guide from OWASP☆44Aug 13, 2025Updated 6 months ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 4 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- Cheat sheet☆36Dec 16, 2019Updated 6 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 3 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- ☆11Apr 21, 2022Updated 3 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- Code Examples for the Web and Cloud Applications Security Course☆12Mar 2, 2025Updated 11 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- ☆10Aug 28, 2020Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆12Mar 31, 2021Updated 4 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- Presentaciones de congresos☆55Jun 21, 2024Updated last year
- Everything about Microsoft Cloud (Azure, M365, etc.) and a hybrid infrastructure!☆15Mar 9, 2022Updated 3 years ago
- ☆12Feb 20, 2023Updated 2 years ago