romanzaikin / From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-WorkshopLinks
From Zero to Hero in Web Security Research - Def Con 29 Workshop
☆36Updated last year
Alternatives and similar repositories for From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop
Users that are interested in From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop are comparing it to the libraries listed below
Sorting:
- A repo to support the book☆110Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- ☆64Updated last year
- ☆53Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 3 weeks ago
- king of the hill cybersecurity competition☆32Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Updated 4 months ago
- Tools that trigger False Positive AV alerts☆53Updated 10 months ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- ☆37Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆17Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆47Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- External Playbooks for Public Access☆40Updated 9 months ago
- List of Repositories☆101Updated 4 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Posts about different topics☆40Updated 2 months ago
- esoteric☆54Updated 5 years ago
- ☆116Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 weeks ago
- ☆26Updated 3 weeks ago