romanzaikin / From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-WorkshopLinks
From Zero to Hero in Web Security Research - Def Con 29 Workshop
☆36Updated 11 months ago
Alternatives and similar repositories for From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop
Users that are interested in From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop are comparing it to the libraries listed below
Sorting:
- A repo to support the book☆108Updated 3 years ago
- ☆63Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆86Updated 3 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆45Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated last year
- ☆51Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Tools that trigger False Positive AV alerts☆50Updated 6 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- Public repository for Red Canary Research☆36Updated 4 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated 3 weeks ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- ☆29Updated 6 months ago
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- ☆29Updated 6 months ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- Posts about different topics☆36Updated last year
- ☆37Updated 3 years ago
- List of Repositories☆98Updated 3 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆46Updated 4 years ago
- king of the hill cybersecurity competition☆30Updated 3 years ago
- ☆94Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- ☆39Updated 7 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆52Updated last year