Lists (1)
Sort Name ascending (A-Z)
Starred repositories
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …
Penetration tests guide based on OWASP including test cases, resources and examples.
Kali Linux Cheat Sheet for Penetration Testers
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Getting Started with Data Enngineering
An ever-growing list of resources for data-driven vulnerability assessment and prioritization
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.
Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
Reproduction package of the paper "Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study" in Mining Software Repositories (MSR) 2024
Alexd-y / caldera
Forked from mitre/calderaAutomated Adversary Emulation Platform
Alexd-y / gixy
Forked from yandex/gixyNginx configuration static analyzer
Security Documentation Builder
Alexd-y / og-aws
Forked from nickpoida/og-aws📙 Amazon Web Services — a practical guide
Alexd-y / ATTACK-Tools
Forked from nshalabi/ATTACK-ToolsUtilities for MITRE™ ATT&CK
Alexd-y / SUDO_KILLER
Forked from TH3xACE/SUDO_KILLERA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Alexd-y / attack-website
Forked from mitre-attack/attack-websiteMITRE ATT&CK Website
A python module for working with ATT&CK
Alexd-y / learnapidoc-ru
Forked from docops-hq/learnapidoc-ruКурс по документированию API. Вольный перевод курса https://idratherbewriting.com/learnapidoc/, составленного Томом Джонсоном, техническим писателем Amazon.