sapran / Ukraine-infosec-conferences
Анонси, програми та архів матеріалів українських конференцій з кібер-безпеки.
☆42Updated 3 years ago
Alternatives and similar repositories for Ukraine-infosec-conferences:
Users that are interested in Ukraine-infosec-conferences are comparing it to the libraries listed below
- OWASP Ukraine 2019 CTF☆12Updated 2 years ago
- Як не стати кібер-жертвою☆245Updated last year
- Hacker101☆47Updated 6 years ago
- ☆75Updated 3 years ago
- XSS explot kit/Blind XSS framework/BurpSuite extension☆49Updated 4 years ago
- Set up your own BurpSuite☆37Updated 6 years ago
- Examples for Advanced Web Hacking Workshop☆35Updated 5 years ago
- google hack database automation tool☆201Updated 7 years ago
- Resources for learning in IT | Список материалов для обучения в ИТ☆42Updated 4 years ago
- ☆10Updated 8 years ago
- ☆34Updated 4 years ago
- Advanced virtual host bruteforcer☆31Updated 9 years ago
- Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.☆22Updated 8 years ago
- Race Condition framework☆269Updated 2 years ago
- Awesome web penetration testing☆9Updated 6 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆67Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆17Updated 9 years ago
- Apache server-status link parser☆24Updated 5 years ago
- Письма к студентам курса☆104Updated 4 years ago
- SQLMap Cheatsheet v1.0 for sqlmap 1.0-dev-a72d738☆76Updated 10 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Turn your Burp suite into headless active web application vulnerability scanner☆154Updated 7 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Updated 8 years ago
- A list of checks with tips for analyzing the security of Android applications☆12Updated 5 years ago
- QCTF School 2018. Developed with ♥ by Hackerdom team☆12Updated 6 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- A list of collected articles and resources from the website Peerlyst☆17Updated 8 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆19Updated 7 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- VPN pentest tools and scripts☆125Updated 7 years ago