vibenas / Cybersecurity-Lithuania-MapLinks
Map of Cybersecurity Sector in Lithuania
☆25Updated last month
Alternatives and similar repositories for Cybersecurity-Lithuania-Map
Users that are interested in Cybersecurity-Lithuania-Map are comparing it to the libraries listed below
Sorting:
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆483Updated 7 months ago
- This is a companion to the Security Engineer Questions☆205Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆704Updated 3 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 5 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆405Updated last year
- ☆754Updated 3 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆754Updated 2 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆935Updated last month
- University lecture on "IT Security" as Open Educational Resources material☆376Updated 2 years ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆657Updated 8 months ago
- DevSecOpsGuides☆192Updated 10 months ago
- A list of online news & info sources in the InfoSec/Cybersecurity space☆385Updated 6 months ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Updated 5 years ago
- BlueHound - pinpoint the security issues that actually matter☆760Updated 2 years ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆720Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆262Updated 3 years ago
- Awesome cloud enumerator☆1,091Updated 11 months ago
- A small collection of potentially useful contract templates☆418Updated last month
- Azure and AWS Attacks☆1,112Updated 3 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆676Updated 5 years ago
- undergroundwires CEH-in-bullet-points in pdf format☆119Updated 2 years ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆548Updated 3 weeks ago
- ☆432Updated 4 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,207Updated last week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆603Updated last week
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆428Updated last year
- AIL framework - Analysis Information Leak framework☆874Updated last week
- A query aggregator for OSINT based threat hunting☆930Updated 2 weeks ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 3 weeks ago
- The Open-Source AWS Cyber Range☆491Updated 5 years ago