paulveillard / cybersecurity-static-analysisLinks
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆14Updated 3 years ago
Alternatives and similar repositories for cybersecurity-static-analysis
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
Sorting:
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆53Updated 2 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- ☆101Updated 4 years ago
- CTF and Bug Bounty Hunting WriteUps.☆21Updated last month
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆90Updated last year
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆38Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆66Updated 3 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- This is a repository for network security tools and technologies.☆99Updated 3 years ago
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆21Updated last year
- List of some cybersecurity conferences☆57Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 3 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 3 months ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆17Updated 3 years ago
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆62Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- Penetration Testing Interview Questions☆51Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆56Updated 9 months ago
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 3 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- Real Android malware apps discussed in the book☆42Updated 2 years ago
- Resources for Browser Security Research☆44Updated 3 years ago