Skip to content

Latest commit

 

History

History
51 lines (35 loc) · 4.59 KB

README.md

File metadata and controls

51 lines (35 loc) · 4.59 KB

Project Straylight

Project straylight has been constructed as a foundation of accelerators, walkthroughs, designs, and tools that can help security researchers and companies improve their information security capabilities.

The goals of project straylight are three-fold:

  • Accelerators — To introduce a series of accelerators that can help security researchers and companies improve their information security capabilities.
  • Mentoring — To help you advance your career in information security; whether you are just getting started, trying to advance into a principal technical role, or even if you are working in a leadership capacity.
  • Collaboration — To learn from you, to establish more connections, to bounce ideas for feedback, and to help solve this challenge of security together.

Introduction

A deeper perspective on the overall project can be referenced in the Brevity In Motion blog at:

"Stray light is light in an optical system, which was not intended in the design. The light may be from the intended source, but follow paths other than intended, or it may be from a source other than the intended source."

Success in security, hacking, and puzzles all require creativity, ambition, curiosity, and logic. Building a resilient defense is hard. Building an effective security program is exponentially harder.

Let's solve this together!

Learning Resources

Walkthroughs

External IP domain reconnaissance and attack surface visualization in under 2 minutes.

Search the html across 25 billion websites for passive reconnaissance using common crawl

Presentations

Let the bugs come to me - how to build cloud-based recon automation at scale

Combining notebooks, datasets, and cloud for the ultimate automation factory

Elevating your career through scientific computing and the cloud