paulveillard / cybersecurity-static-analysisLinks
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆14Updated 3 years ago
Alternatives and similar repositories for cybersecurity-static-analysis
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆23Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆18Updated 2 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆20Updated last year
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆60Updated 5 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆14Updated 3 years ago
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆13Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆79Updated 8 months ago
- List of some cybersecurity conferences☆57Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆11Updated 2 years ago
- ☆25Updated last year
- ☆29Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- 📚A curated list of product security resources.☆20Updated 2 weeks ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Challenge Python☆19Updated 2 years ago
- Penetration Testing Interview Questions☆40Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆31Updated last year
- ☆99Updated 3 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 9 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- ☆21Updated 2 years ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, lear…☆54Updated 2 years ago
- ☆39Updated last year
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- ☆11Updated 2 years ago