Lists (5)
Sort Name ascending (A-Z)
Starred repositories
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
This GitHub page shows the CISO Tradecraft Podcast broken down by Topic
Protection of natural persons with regard to the processing of personal data and on the free movement of such data.
The CNIL publishes a GDPR guide for developers
Build Security Incident Response for GDPR Data Protection, by EC-Council
GDPR Privacy Data Protection CASE STUDIES Explained, by EC-Council
OWASP Web Application Security Testing Checklist
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the…
Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics…
OWASP Top 10 for Docker Containers and Kubernetes Security, by EC-Council
This repo contains code and examples to operationalize Azure review checklists.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Solutions and notes for the HackThisSite.org pentesting challenges, intended to be accurate as of 2Q 2019.
Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.
Draw.io libraries for threat modeling diagrams
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
The Challenge for OWASP's Kubernetes CTF
threatspec - continuous threat modeling, through code