paulveillard / cybersecurity-static-analysis
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆13Updated 3 years ago
Alternatives and similar repositories for cybersecurity-static-analysis:
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆35Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Updated 9 months ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆23Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆58Updated 2 months ago
- ☆29Updated 3 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆20Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆80Updated 6 months ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 6 months ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆15Updated 2 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆51Updated 3 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 2 years ago
- Regex patterns for manual application source code review☆27Updated 4 years ago
- Penetration Testing Interview Questions☆36Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- This repository is about sharing knowledge of Hacking to Beginners and is dedicated to @i_amsphinx 365 days of Learning and the Tweets co…☆28Updated last year
- ☆18Updated 7 months ago
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆56Updated last year
- Repository of cybersecurity mindmaps☆31Updated 2 years ago
- ☆11Updated 2 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆37Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆10Updated 2 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆26Updated 2 years ago
- ☆19Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆46Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆31Updated last year