onebeyond / cybersecurity-handbook
Cybersecurity handbook by One Beyond
☆114Updated last year
Alternatives and similar repositories for cybersecurity-handbook:
Users that are interested in cybersecurity-handbook are comparing it to the libraries listed below
- A vast collection of security tools and resources curated by the community.☆195Updated last week
- CSbyGB PenTips Gitbook☆109Updated last month
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated 2 months ago
- A curated list of awesome GraphQL Security frameworks, libraries, software and resources☆323Updated last year
- Herramientas, máquinas y recursos para enfrentarte al OSCP☆55Updated 2 years ago
- OSCP cheatsheet☆107Updated last year
- Websec interview questions by tib3rius answered☆307Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆121Updated 3 years ago
- This is a repository for network security tools and technologies.☆96Updated 2 years ago
- Docker toolbox for pentest of web based application.☆149Updated this week
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆211Updated last year
- Intentionaly very vulnerable API with bonus bad coding practices☆45Updated last year
- ☆137Updated 3 years ago
- APIs to practise diverse techniques to hack JWT Signatures☆65Updated 2 years ago
- Linux Security and Hardening Security Guide☆211Updated last year
- ☆133Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆285Updated 11 months ago
- Awesome information for WebSockets security research☆266Updated 3 years ago
- ☆436Updated 2 years ago
- ☆126Updated last month
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆159Updated 7 months ago
- Watch the latest awesome security talks around the globe☆272Updated last month
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- A Broken Application - Very Vulnerable!☆154Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 5 months ago
- Cybersecurity Notes☆157Updated last year
- ☆85Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆103Updated 3 years ago
- DevSecOpsGuides☆186Updated this week
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆271Updated last week