Lists (3)
Sort Name ascending (A-Z)
Stars
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
An open-source userscript manager for Safari
A curated list of cryptography resources and links.
A curated list of cryptography papers, articles, tutorials and howtos.
For Mac users in enterprise environments, this application gives users control over the administration of their machine by elevating their level of access to administrator privileges on macOS. User…
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Shostack's 4 Question Frame for Threat Modeling
Terraform modules for an EC2 Image Builder Pipeline with an Amazon Linux 2 Baseline Container Recipe, which is used to deploy a Docker based Amazon Linux 2 Container Image that has been hardened ac…
Checklist of the most important security countermeasures when designing, testing, and releasing your API
This repo contains code and examples to operationalize Azure review checklists.
A curated list of awesome security platforms,including CTF/Security Response Center/Bug Tracker and so on.
This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readines…
Offensive Software Exploitation Course
DNS-Blocklists: For a better internet - keep the internet clean!
Small and highly portable detection tests based on MITRE's ATT&CK.
⭐️ A curated list of awesome forensic analysis tools and resources