A curated list of Awesome Threat Intelligence resources
Updated 2024-05-15 11:15:50 +00:00
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
awesome-list
hacking
awesome-lists
cybersecurity
ethical-hacking
ethicalhacking
exploit
exploit-development
exploits
hacker
hackers
hacking-series
penetration-testing
training
video-course
vulnerability
vulnerability-assessment
vulnerability-identification
vulnerability-management
vulnerability-scanners
Updated 2024-05-16 13:13:45 +00:00
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
awesome-list
awesome
hacktoberfest
penetration-testing
pentest
vulnerabilities
hacktoberfest2022
security-protection
security-shepherd
test-lab
vulnerable
vulnerable-apps
badstore
bwapp
hack
hacking-skills
lab
penetration-skills
Updated 2024-05-17 02:56:20 +00:00
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
awesome-list
awesome
security
hacking
awesome-lists
security-tools
osint
vulnerability
exploit
search-engine
vulnerabilities
wifi-network
bugbounty
cve
dns
domain
hacking-tools
osint-tool
redteam
redteaming
Updated 2024-05-18 07:33:46 +00:00
A compiled checklist of 300+ tips for protecting digital security and privacy in 2022
awesome-list
awesome
security
privacy
hacktoberfest
surveillance
privacy-protection
cybersecurity
open-source
web-browsing
censorship
checklist
defense
hacktoberfest2022
protection
security-tools
Updated 2024-05-19 02:06:03 +00:00
Board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key
Updated 2024-05-20 08:57:00 +00:00
Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
Updated 2024-05-20 11:29:40 +00:00
A practical approach to Privacy and Security
Updated 2024-05-20 23:01:13 +00:00
Monero: the secure, private, untraceable cryptocurrency
Updated 2024-05-21 04:45:36 +00:00
A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
security
cryptography
encrypted
one-time
paste
pastebin
php
self-destroy
self-hosted
crypto
self-hosting
Updated 2024-05-21 04:46:11 +00:00