Lists (2)
Sort Name ascending (A-Z)
Stars
Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam
Awesome information for WebSockets security research
Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appra…
Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.
Simple SAML Identity Provider (IdP) for Node
Vulnerable SAML infrastructure training applicaiton
Tools and Techniques for Blue Team / Incident Response
Research into Undocumented Behavior of Azure AD Refresh Tokens
This repository contains information on the CVEs I found.
This repo contains the code for my secure code review challenges
A list of examples and references of hacking with Bash and the Curl command
Mirror of Apache HTTP Server. Issues: http://issues.apache.org
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
Collection of example YARA-L rules for use within Google Security Operations
Awesome list of Search Engines for Cybersecurity Researchers
Repository to house markdown templates for researchers
Open source education content for the researcher community
A cheat sheet that contains advanced queries for SQL Injection of all types.
A Huge Learning Resources with Labs For Offensive Security Players