This is a companion to the Security Engineer Questions
☆203Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for Security_Architect_and_Principal_Security_Engineer_Interview_Questions
Users that are interested in Security_Architect_and_Principal_Security_Engineer_Interview_Questions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Every Security Engineer Interview Question From Glassdoor.com☆1,257Mar 2, 2024Updated 2 years ago
- Websec interview questions by tib3rius answered☆308Nov 13, 2023Updated 2 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 2 months ago
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆448Dec 28, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆2,460Feb 2, 2026Updated 2 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆683Aug 7, 2020Updated 5 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- ssh jump host appliance☆26Mar 23, 2022Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,039Dec 21, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,930Oct 1, 2025Updated 6 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆382Apr 18, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆653Updated this week
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆132Jul 14, 2024Updated last year
- Device & Account Security Checklist☆12Aug 5, 2025Updated 8 months ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last month
- ☆32Updated this week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,741Aug 2, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Jul 17, 2024Updated last year
- ☆114Jun 8, 2023Updated 2 years ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Sep 29, 2023Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- ☆11Dec 9, 2025Updated 4 months ago
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 3 years ago
- A repository of breaches of AWS customers☆802Mar 30, 2026Updated 2 weeks ago
- Dropbox LLM Security research code and results☆258May 21, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆256Aug 31, 2022Updated 3 years ago
- A crowdsourced Azure RBAC permissions reference.☆17Jul 9, 2025Updated 9 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆985Sep 2, 2024Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Apr 21, 2023Updated 2 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,412Jun 24, 2025Updated 9 months ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆138Feb 25, 2023Updated 3 years ago