romanzaikin / From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-WorkshopLinks
From Zero to Hero in Web Security Research - Def Con 29 Workshop
☆36Updated last year
Alternatives and similar repositories for From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop
Users that are interested in From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop are comparing it to the libraries listed below
Sorting:
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- A repo to support the book☆109Updated 4 years ago
- ☆64Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆90Updated 6 months ago
- ☆51Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆47Updated 5 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Tools that trigger False Positive AV alerts☆51Updated 9 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆33Updated 3 months ago
- ☆63Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ☆37Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆59Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆16Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 3 years ago
- king of the hill cybersecurity competition☆32Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- List of Repositories☆100Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated 11 months ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- ☆116Updated 2 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- ☆94Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 4 months ago
- Posts about different topics☆40Updated last month
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago