paulveillard / cybersecurity-static-analysisLinks
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆14Updated 3 years ago
Alternatives and similar repositories for cybersecurity-static-analysis
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆24Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆82Updated 9 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆61Updated 5 months ago
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆56Updated 2 years ago
- Resources for Browser Security Research☆40Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- ☆99Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆49Updated last week
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 2 weeks ago
- Penetration Testing Interview Questions☆43Updated 3 years ago
- Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics☆8Updated 2 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆19Updated 2 years ago
- ☆82Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆93Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 2 years ago
- This is a repository for network security tools and technologies.☆97Updated 2 years ago
- Hi everyone,☆59Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- List of some cybersecurity conferences☆57Updated last month
- Watch the latest awesome security talks around the globe☆275Updated 4 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆54Updated 5 months ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆163Updated 10 months ago
- Tools & Resources for Cyber Security Operations☆238Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago