paulveillard / cybersecurity-static-analysisLinks
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆14Updated 3 years ago
Alternatives and similar repositories for cybersecurity-static-analysis
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆25Updated last year
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- ☆99Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆50Updated this week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- eLearnSecurity Certified Exploit Development☆104Updated 4 years ago
- Penetration Testing Interview Questions☆44Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆81Updated 10 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆72Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆61Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- A LLM explicitly designed for getting hacked☆157Updated 2 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆56Updated 2 years ago
- ☆82Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆94Updated 2 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆56Updated last month
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆106Updated last week
- Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics☆8Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- Resources for Browser Security Research☆44Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆50Updated 2 years ago
- Awesome Secure Coding☆19Updated 6 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆96Updated 7 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆20Updated last year