paulveillard / cybersecurity-static-analysis
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
☆12Updated 2 years ago
Alternatives and similar repositories for cybersecurity-static-analysis:
Users that are interested in cybersecurity-static-analysis are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 6 months ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆48Updated 2 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆34Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated last year
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆11Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆73Updated 3 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Updated 2 years ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated 4 months ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆11Updated 10 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Found resources in my malware researching adventure.☆15Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆106Updated last year
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆55Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆56Updated this week
- New Framework Red Team Operations☆17Updated 3 years ago
- ☆29Updated 3 years ago
- Penetration Testing Interview Questions☆35Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆46Updated last year
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆15Updated 7 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 8 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆31Updated 10 months ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 4 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆51Updated 5 months ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆28Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆38Updated 2 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆60Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago