Lists (7)
Sort Name ascending (A-Z)
Stars
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
AWSGoat : A Damn Vulnerable AWS Infrastructure
AI tool to build charts based on text input
Performing website vulnerability scanning using OpenAI technologie
Metlo is an open-source API security platform.
Rapidly Search and Hunt through Linux Forensics Artifacts
A curated list of awesome command-line software for macOS.
GPT-3 found hundreds of security vulnerabilities in this repo
Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom tests, Sensitive data exposure
Autohack is a scripting framework to help save you time. Whether you're in a hurry or have a lot of time on your hands, learning and remembering all the syntax required to use all the sorts of tool…
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful commands that every pentester use on a daily basis.
A collection of inspiring resources related to engineering management and tech leadership
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
RedEye is a visual analytic tool supporting Red & Blue Team operations
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
Know the dangers of credential reuse attacks.
OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reduction. SBOM, SaaSBOM, HBOM, AI/ML-BOM, CBOM, OBOM, MBOM, VDR, an…
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
In-depth attack surface mapping and asset discovery
A curated list of tools for incident response