Lists (2)
Sort Name ascending (A-Z)
Stars
Uma lista de recursos para quem deseja aprender sobre Physical Pentesting
A vulnerability scanner for container images and filesystems
How to be low-level programmer
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A curated list of awesome GraphQL Security frameworks, libraries, software and resources
A simple, fast and user-friendly alternative to 'find'
Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating systems.
Fast disk usage analyzer with console interface written in Go
A cheat sheet that contains advanced queries for SQL Injection of all types.
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.
The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.
Active Directory and Internal Pentest Cheatsheets
In-depth attack surface mapping and asset discovery
💯 Curated coding interview preparation materials for busy software engineers
Tools, tips, tricks, and more for exploring ICS Security.
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.