Learn
Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application
🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
All-in-one Kubernetes access manager. User-level credentials, RBAC, SSO, audit logs.
A curated list of awesome forensic analysis tools and resources
Offensive Software Exploitation Course
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readines…
This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝
An open-source userscript manager for Safari