Lists (1)
Sort Name ascending (A-Z)
Starred repositories
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …
Penetration tests guide based on OWASP including test cases, resources and examples.
Kali Linux Cheat Sheet for Penetration Testers
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Getting Started with Data Enngineering
An ever-growing list of resources for data-driven vulnerability assessment and prioritization
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.
Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
Reproduction package of the paper "Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study" in Mining Software Repositories (MSR) 2024