onebeyond / cybersecurity-handbook
Cybersecurity handbook by One Beyond
☆114Updated last year
Alternatives and similar repositories for cybersecurity-handbook:
Users that are interested in cybersecurity-handbook are comparing it to the libraries listed below
- Docker toolbox for pentest of web based application.☆145Updated this week
- Repository with some necessary information for you to create your PenTest consultancy☆93Updated last week
- A vast collection of security tools and resources curated by the community.☆191Updated last month
- A Broken Application - Very Vulnerable!☆136Updated 2 months ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆159Updated 4 months ago
- Awesome information for WebSockets security research☆258Updated 3 years ago
- ⚔️ A compiled list of companies who have active programs for responsible disclosure☆104Updated last week
- A curated list of awesome GraphQL Security frameworks, libraries, software and resources☆309Updated 11 months ago
- ☆80Updated last year
- OSCP Privilege Escalation MindMap/Guide☆192Updated 2 years ago
- This is a repository for network security tools and technologies.☆93Updated 2 years ago
- ☆193Updated 2 years ago
- ☆37Updated 4 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆118Updated 3 years ago
- APIs to practise diverse techniques to hack JWT Signatures☆64Updated 2 years ago
- ☆137Updated 3 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆280Updated 9 months ago
- someone needs help☆64Updated 2 years ago
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆238Updated 3 weeks ago
- Little Bug Bounty & Hacking Tools⚔️☆344Updated 2 months ago
- Discover hidden debugging parameters and uncover web application secrets☆234Updated last year
- Top disclosed reports from HackerOne☆147Updated 3 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆311Updated 3 weeks ago
- Intentionaly very vulnerable API with bonus bad coding practices☆40Updated 11 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆264Updated last year
- API Security Project aims to present unique attack & defense methods in API Security field☆281Updated 2 years ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆231Updated this week
- Web Security Checklist (Bug Bounty & Pentesting)☆163Updated 2 years ago
- Watch the latest awesome security talks around the globe☆270Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆100Updated 3 years ago