Skip to content
View Alexd-y's full-sized avatar

Block or report Alexd-y

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.

Jupyter Notebook 44 4 Updated Oct 1, 2025

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …

12,053 1,333 Updated Sep 2, 2025

Getting Started with Data Enngineering

Python 1,302 590 Updated Apr 20, 2025

AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities

Python 44 8 Updated Apr 10, 2024

Reproduction package of the paper "Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study" in Mining Software Repositories (MSR) 2024

Python 5 1 Updated Jan 20, 2024

Kali Linux Cheat Sheet for Penetration Testers

2,587 421 Updated Sep 1, 2023

An ever-growing list of resources for data-driven vulnerability assessment and prioritization

129 14 Updated Mar 1, 2023

Penetration tests guide based on OWASP including test cases, resources and examples.

2,704 563 Updated Mar 23, 2022

Automated Adversary Emulation Platform

Python 1 Updated Jan 25, 2022

A python module for working with ATT&CK

Python 1 Updated Jan 7, 2022

MITRE ATT&CK Website

Python 1 Updated Jan 7, 2022

A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

1,929 323 Updated Sep 5, 2021

A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.

Shell 1 Updated Aug 31, 2021

Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Python 10 3 Updated May 10, 2021

Utilities for MITRE™ ATT&CK

HTML 1 Updated Dec 1, 2020

📙 Amazon Web Services — a practical guide

Shell 1 Updated Apr 8, 2020

Security Documentation Builder

Go 1 Updated Feb 11, 2020

Nginx configuration static analyzer

Python 1 Updated Jan 9, 2020

Курс по документированию API. Вольный перевод курса https://idratherbewriting.com/learnapidoc/, составленного Томом Джонсоном, техническим писателем Amazon.

1 Updated Oct 19, 2019