paulveillard / cybersecurity-static-analysisLinks
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆14Updated 3 years ago
Alternatives and similar repositories for cybersecurity-static-analysis
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- A miscellany of thoughts.☆47Updated last year
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆39Updated 2 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆55Updated 3 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆167Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆68Updated 5 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆73Updated this week
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆56Updated 11 months ago
- ☆81Updated 2 years ago
- Penetration Testing Interview Questions☆52Updated 3 years ago
- This is the open source version of vulnerable.codes platform.☆28Updated 8 months ago
- A LLM explicitly designed for getting hacked☆164Updated 2 years ago
- This is a repository for network security tools and technologies.☆101Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆98Updated 2 years ago
- Awesome Secure Coding☆19Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Updated 2 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 3 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆42Updated 9 months ago
- List of some cybersecurity conferences☆58Updated 4 months ago
- ☆102Updated 4 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 5 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆88Updated last year
- port+dir+param bruteforcing at the same time using ffuf☆17Updated last year
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆101Updated last year