- Penetration testing methods. [OWASP Top 10 vulnerabilities]
- Attack vectors. White/Gray/Black Box. [Web server, Web application, Service ports,...]
- Web application vulnerabilities.
- Privilege escalation techniques. [Windows, Linux and any other *nix]
- Automated and manual web application vulnerability testing.
- API vulnerabilities.
- Cloud attacks and securing cloud networks. [AWS, Azure, Google cloud]
- Network forensics.
Popular repositories Loading
-
-
AD-Config-Automation
AD-Config-Automation PublicForked from kha1ifuzz/AD-Config-Automation
Scripts and piece of codes used for Active Directory configuration
PowerShell
-
Villain
Villain PublicForked from t3l3machus/Villain
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy…
Python
-
Mindmap
Mindmap PublicForked from Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
-
anomaly-detection-resources
anomaly-detection-resources PublicForked from yzhao062/anomaly-detection-resources
Anomaly detection related books, papers, videos, and toolboxes
Python
-
RedCloud-OS
RedCloud-OS PublicForked from RedTeamOperations/RedCloud-OS
RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)
Shell
If the problem persists, check the GitHub status page or contact support.